sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6a000054008100091100000000187ef86248b90000000000fbeb59fb77ca68da656c956c2acc0073797a5f000000000004000000000000000000000000008fa1e43985390748daba8c0265b0cccf2bcf836e10e31177e220d367822eaa6bf5c9f5a081623e067a0be5c14460abd02fce70d44177121ece14c540e8b6f32532e20a001b2bc4223c254af3a5f2e352ab386de7a96e06797fcc332cf80e6853900e88dd1f122c9345e1826d5a56c66201d2765834db4c81467e5d4700000000000000000000b3a838a238aa1c631252c0019bae85072cfd88028a3f1195f6f24867f3b2ea8f676e1265b4527446f36db4b661e4078162e4a2f130f39d38db8cf1bc706f53783b81d948144505c551a67622d64ebe5a84618ae1dd8f1aa7d96e8cbfd5ee9527c264f9f856b8b3dc7f6d5e3534ccf24a4bc4029d1f000000000000009df3fc2c73f8f09d19130e80b57c77c47fea25401d69ff55da02ea6ee21fef4029711b415b5d0796c5ece2893f82cb2d547b8842060b8f17642f4b4462606d85ee81eb7636ca14c5f9c68c1961bfbf271169f0575d8d86bf9ca8b3f6738bc16fa508e99fe667670f49", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) 00:49:02 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6a000054008100091100000000187ef86248b90000000000fbeb59fb77ca68da656c956c2acc0073797a5f000000000004000000000000000000000000008fa1e43985390748daba8c0265b0cccf2bcf836e10e31177e220d367822eaa6bf5c9f5a081623e067a0be5c14460abd02fce70d44177121ece14c540e8b6f32532e20a001b2bc4223c254af3a5f2e352ab386de7a96e06797fcc332cf80e6853900e88dd1f122c9345e1826d5a56c66201d2765834db4c81467e5d4700000000000000000000b3a838a238aa1c631252c0019bae85072cfd88028a3f1195f6f24867f3b2ea8f676e1265b4527446f36db4b661e4078162e4a2f130f39d38db8cf1bc706f53783b81d948144505c551a67622d64ebe5a84618ae1dd8f1aa7d96e8cbfd5ee9527c264f9f856b8b3dc7f6d5e3534ccf24a4bc4029d1f000000000000009df3fc2c73f8f09d19130e80b57c77c47fea25401d69ff55da02ea6ee21fef4029711b415b5d0796c5ece2893f82cb2d547b8842060b8f17642f4b4462606d85ee81eb7636ca14c5f9c68c1961bfbf271169f0575d8d86bf9ca8b3f6738bc16fa508e99fe667670f49", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) [ 3395.519123] audit_printk_skb: 1095 callbacks suppressed [ 3395.519131] audit: type=1400 audit(1574988542.413:410576): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.524972] audit: type=1400 audit(1574988542.423:410577): avc: denied { sys_admin } for pid=12448 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.526270] audit: type=1400 audit(1574988542.423:410578): avc: denied { sys_admin } for pid=12448 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.558416] audit: type=1400 audit(1574988542.453:410579): avc: denied { dac_override } for pid=12453 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.589297] audit: type=1400 audit(1574988542.483:410580): avc: denied { sys_admin } for pid=12456 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.590663] audit: type=1400 audit(1574988542.483:410581): avc: denied { sys_admin } for pid=12456 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.678394] audit: type=1400 audit(1574988542.573:410582): avc: denied { sys_admin } for pid=12456 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.702729] audit: type=1400 audit(1574988542.593:410583): avc: denied { sys_admin } for pid=12453 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3395.703952] audit: type=1400 audit(1574988542.593:410584): avc: denied { sys_admin } for pid=12453 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.065394] audit: type=1400 audit(1574988542.963:410585): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:03 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000001c0)='./file0\x00', 0x80000000) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) 00:49:03 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000100)=ANY=[@ANYRES32], 0x1}}, 0x40004) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="92ad32a9dbda7a477f64c672903dc8be4970096fb4ca030cb52b1bac5dbdf76ca021920a095008eff7789e", @ANYRES16=r1, @ANYRESDEC=r1, @ANYRES16=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64], @ANYBLOB="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", @ANYRESOCT, @ANYRES16], @ANYBLOB="000228bd7000ffdbdf250500800000080001000001000008007a0003e400000400020008000100ffff000028000200040004000800020002000000040004000400040008000200010000000008000100caa700000800010008000000080001000300000004000200080001000200000004000200040009009cbba7d2497c5c0d93efb0985f9fd2c52af45d13f01e5413c61c75c936ae0f2675f2c3a0614c9b64332c218bcd0bea55a7757b018da77d72ef8c17e7bd44053d2b429fdb0b1179639fe22e0b7d4dfbd1b9de6f6544769deb66681f9fff75b9"], 0x2}}, 0x8011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') pipe2(&(0x7f0000000400), 0x80000) r11 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r12, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r12, 0xa, 0x12) recvmmsg(r13, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r12, r13) fcntl$setown(r13, 0x8, r11) tkill(r11, 0x16) syz_open_procfs(r11, &(0x7f0000000800)='net/if_inet6\x00') r14 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r15 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$FICLONE(r15, 0x40049409, r14) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r16, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r16, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r16, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r16, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x10001, @ipv4={[], [], @empty}, 0x6}}, 0x0, 0x4, 0x0, "5f1fbd815daad4ebe0c69d63b32e82ce2c7e166c80fea17961c1d534fdafab3bc5108eeff64dbebeed4df9d008083e91795df7441bdad6f99c99155492aceb230e399822137dd9b078b976cfdf22c87c"}, 0xd8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r16, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r17+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) pipe(0x0) io_submit(r18, 0x1, &(0x7f0000000040)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r19 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(r19, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) socketpair(0x2, 0xd, 0x4c, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) 00:49:03 executing program 5: clone(0x4000204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x1039, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = gettid() getpid() ptrace(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x2, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{r1, r2+10000000}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ptrace(0x10, r0) r3 = gettid() tkill(r3, 0x1000000000016) 00:49:04 executing program 1: socketpair(0x4, 0xa, 0xc5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$cgroup_type(r3, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000000800010006081000418e00000004fcff", 0x58}], 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 00:49:04 executing program 1: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x262) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0x88002) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, 0x0, 0x0) open(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:49:04 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6a000054008100091100000000187ef86248b90000000000fbeb59fb77ca68da656c956c2acc0073797a5f000000000004000000000000000000000000008fa1e43985390748daba8c0265b0cccf2bcf836e10e31177e220d367822eaa6bf5c9f5a081623e067a0be5c14460abd02fce70d44177121ece14c540e8b6f32532e20a001b2bc4223c254af3a5f2e352ab386de7a96e06797fcc332cf80e6853900e88dd1f122c9345e1826d5a56c66201d2765834db4c81467e5d4700000000000000000000b3a838a238aa1c631252c0019bae85072cfd88028a3f1195f6f24867f3b2ea8f676e1265b4527446f36db4b661e4078162e4a2f130f39d38db8cf1bc706f53783b81d948144505c551a67622d64ebe5a84618ae1dd8f1aa7d96e8cbfd5ee9527c264f9f856b8b3dc7f6d5e3534ccf24a4bc4029d1f000000000000009df3fc2c73f8f09d19130e80b57c77c47fea25401d69ff55da02ea6ee21fef4029711b415b5d0796c5ece2893f82cb2d547b8842060b8f17642f4b4462606d85ee81eb7636ca14c5f9c68c1961bfbf271169f0575d8d86bf9ca8b3f6738bc16fa508e99fe667670f49", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) 00:49:05 executing program 1: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x262) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0x88002) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, 0x0, 0x0) open(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:49:05 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) 00:49:05 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) 00:49:05 executing program 1: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x262) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0x88002) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, 0x0, 0x0) open(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:49:06 executing program 1: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000000), 0x262) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0x88002) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, 0x0, 0x0) open(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:49:06 executing program 5: clone(0x4000204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x1039, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = gettid() getpid() ptrace(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x2, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{r1, r2+10000000}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ptrace(0x10, r0) r3 = gettid() tkill(r3, 0x1000000000016) 00:49:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x100000000000100, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000640)={0x2, 0x4e20, @dev}, 0x10) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) 00:49:07 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000100)=ANY=[@ANYRES32], 0x1}}, 0x40004) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="92ad32a9dbda7a477f64c672903dc8be4970096fb4ca030cb52b1bac5dbdf76ca021920a095008eff7789e", @ANYRES16=r1, @ANYRESDEC=r1, @ANYRES16=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64], @ANYBLOB="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", @ANYRESOCT, @ANYRES16], @ANYBLOB="000228bd7000ffdbdf250500800000080001000001000008007a0003e400000400020008000100ffff000028000200040004000800020002000000040004000400040008000200010000000008000100caa700000800010008000000080001000300000004000200080001000200000004000200040009009cbba7d2497c5c0d93efb0985f9fd2c52af45d13f01e5413c61c75c936ae0f2675f2c3a0614c9b64332c218bcd0bea55a7757b018da77d72ef8c17e7bd44053d2b429fdb0b1179639fe22e0b7d4dfbd1b9de6f6544769deb66681f9fff75b9"], 0x2}}, 0x8011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') pipe2(&(0x7f0000000400), 0x80000) r11 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r12, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r12, 0xa, 0x12) recvmmsg(r13, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r12, r13) fcntl$setown(r13, 0x8, r11) tkill(r11, 0x16) syz_open_procfs(r11, &(0x7f0000000800)='net/if_inet6\x00') r14 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r15 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$FICLONE(r15, 0x40049409, r14) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r16, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r16, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r16, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r16, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x10001, @ipv4={[], [], @empty}, 0x6}}, 0x0, 0x4, 0x0, "5f1fbd815daad4ebe0c69d63b32e82ce2c7e166c80fea17961c1d534fdafab3bc5108eeff64dbebeed4df9d008083e91795df7441bdad6f99c99155492aceb230e399822137dd9b078b976cfdf22c87c"}, 0xd8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r16, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r17+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) pipe(0x0) io_submit(r18, 0x1, &(0x7f0000000040)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r19 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(r19, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) socketpair(0x2, 0xd, 0x4c, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) 00:49:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x100000000000100, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000640)={0x2, 0x4e20, @dev}, 0x10) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) [ 3400.589805] audit_printk_skb: 1119 callbacks suppressed [ 3400.589813] audit: type=1400 audit(1574988547.483:410959): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x100000000000100, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000640)={0x2, 0x4e20, @dev}, 0x10) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) [ 3400.688858] audit: type=1400 audit(1574988547.583:410960): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.720999] audit: type=1400 audit(1574988547.613:410961): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:07 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) [ 3400.724295] audit: type=1400 audit(1574988547.613:410962): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.734728] audit: type=1400 audit(1574988547.633:410963): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.744708] audit: type=1400 audit(1574988547.643:410964): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.758877] audit: type=1400 audit(1574988547.653:410965): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.787237] audit: type=1400 audit(1574988547.653:410966): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.790637] audit: type=1400 audit(1574988547.693:410967): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3400.793726] audit: type=1400 audit(1574988547.693:410968): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x100000000000100, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000640)={0x2, 0x4e20, @dev}, 0x10) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @multicast2}, 0x10) 00:49:08 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x100000010) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000180)) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000440)) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x46800) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$input_event(r0, &(0x7f0000000400)={{}, 0x11, 0x6, 0x9}, 0x10) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x4004004}, 0x10) r8 = dup(0xffffffffffffffff) lstat(0x0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x800400, &(0x7f0000001680)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r13, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) fstat(r13, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r15, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r15, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f00000007c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, &(0x7f00000001c0), 0xfffffef3) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r19 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r17, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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", @ANYRES32=r20, @ANYRES32=r21, @ANYRESHEX], 0x1c3) setxattr$system_posix_acl(&(0x7f00000003c0)='./bus\x00', &(0x7f00000004c0)='system.posix_acl_access\x00', &(0x7f0000000800)={{}, {0x1, 0x4}, [{0x2, 0x2, r9}, {0x2, 0x0, r10}, {0x2, 0x2, r11}, {0x2, 0x60083d32752d6d3e, r12}, {0x2, 0x0, r14}], {}, [{0x8, 0x1, r16}, {0x8, 0x0, r21}], {0x10, 0x4}, {0x20, 0x2}}, 0x5c, 0x1) ftruncate(r4, 0x5) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x80000000) 00:49:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) 00:49:09 executing program 3: unshare(0x600) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14103e, 0x0) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0xff7f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x0, 0xffffffff}) 00:49:09 executing program 1: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r2, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 00:49:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f000018efdc)="2400000052001f0014f9f407000904000200071010000100feffffff0800000000000000", 0x24) 00:49:10 executing program 5: clone(0x4000204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x1039, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = gettid() getpid() ptrace(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x2, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{r1, r2+10000000}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ptrace(0x10, r0) r3 = gettid() tkill(r3, 0x1000000000016) 00:49:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x28, 0x10000015, 0x5, 0x0, 0x0, {0x1}, [@typed={0x14, 0x2, @ipv6=@loopback}]}, 0x28}}, 0x0) 00:49:10 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000100)=ANY=[@ANYRES32], 0x1}}, 0x40004) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="92ad32a9dbda7a477f64c672903dc8be4970096fb4ca030cb52b1bac5dbdf76ca021920a095008eff7789e", @ANYRES16=r1, @ANYRESDEC=r1, @ANYRES16=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64], @ANYBLOB="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", @ANYRESOCT, @ANYRES16], @ANYBLOB="000228bd7000ffdbdf250500800000080001000001000008007a0003e400000400020008000100ffff000028000200040004000800020002000000040004000400040008000200010000000008000100caa700000800010008000000080001000300000004000200080001000200000004000200040009009cbba7d2497c5c0d93efb0985f9fd2c52af45d13f01e5413c61c75c936ae0f2675f2c3a0614c9b64332c218bcd0bea55a7757b018da77d72ef8c17e7bd44053d2b429fdb0b1179639fe22e0b7d4dfbd1b9de6f6544769deb66681f9fff75b9"], 0x2}}, 0x8011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') pipe2(&(0x7f0000000400), 0x80000) r11 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r12, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r12, 0xa, 0x12) recvmmsg(r13, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r12, r13) fcntl$setown(r13, 0x8, r11) tkill(r11, 0x16) syz_open_procfs(r11, &(0x7f0000000800)='net/if_inet6\x00') r14 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r15 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$FICLONE(r15, 0x40049409, r14) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r16, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r16, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r16, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r16, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x10001, @ipv4={[], [], @empty}, 0x6}}, 0x0, 0x4, 0x0, "5f1fbd815daad4ebe0c69d63b32e82ce2c7e166c80fea17961c1d534fdafab3bc5108eeff64dbebeed4df9d008083e91795df7441bdad6f99c99155492aceb230e399822137dd9b078b976cfdf22c87c"}, 0xd8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r16, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r17+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) pipe(0x0) io_submit(r18, 0x1, &(0x7f0000000040)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r19 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(r19, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) socketpair(0x2, 0xd, 0x4c, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) 00:49:10 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffffffffffe87) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lseek(r0, 0xffffffff, 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3) write$UHID_INPUT2(r0, 0x0, 0x0) 00:49:10 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000200)=0x0) io_submit(r2, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x10}]) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000140)='\'', 0x1}], 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r3, r1, 0x1000, 0x0) 00:49:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) lseek(r1, 0x20000010000, 0x0) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) creat(&(0x7f0000000280)='./bus\x00', 0x0) 00:49:11 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000200)=0x0) io_submit(r2, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x10}]) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000140)='\'', 0x1}], 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r3, r1, 0x1000, 0x0) 00:49:11 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000200)=0x0) io_submit(r2, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x10}]) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000140)='\'', 0x1}], 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r3, r1, 0x1000, 0x0) 00:49:11 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300081000000000000000000000000200130002003f00000000000000000105000600200000000a00000000000000000000e502170000000000000000000000030000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000006200"/128], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:49:11 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, 0x0) 00:49:11 executing program 4: set_tid_address(0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r0, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x900, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/250) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x63d}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) readv(r2, 0x0, 0x0) flistxattr(r2, &(0x7f00000001c0)=""/137, 0x89) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) 00:49:11 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000200)=0x0) io_submit(r2, 0x30b, &(0x7f0000001700)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x10}]) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000300)=[{&(0x7f0000000140)='\'', 0x1}], 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) tee(r3, r1, 0x1000, 0x0) [ 3405.600978] audit_printk_skb: 1626 callbacks suppressed [ 3405.600987] audit: type=1400 audit(1574988552.493:411511): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.610590] audit: type=1400 audit(1574988552.503:411512): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.612400] audit: type=1400 audit(1574988552.503:411513): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.636382] audit: type=1400 audit(1574988552.533:411515): avc: denied { dac_override } for pid=12669 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.638820] audit: type=1400 audit(1574988552.503:411514): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.676545] audit: type=1400 audit(1574988552.573:411516): avc: denied { net_admin } for pid=12668 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.719682] audit: type=1400 audit(1574988552.613:411517): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.721301] audit: type=1400 audit(1574988552.613:411518): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.746319] audit: type=1400 audit(1574988552.643:411519): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3405.751034] audit: type=1400 audit(1574988552.643:411520): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:13 executing program 5: clone(0x4000204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x1039, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = gettid() getpid() ptrace(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clock_gettime(0x2, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000000)={{r1, r2+10000000}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) ptrace(0x10, r0) r3 = gettid() tkill(r3, 0x1000000000016) 00:49:13 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "1200000006c46f0006000000070000003c9f0300000000000000c2080000000061f071f50aec5843"}, 0x38) 00:49:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_addrs=@in={0x2, 0x4e20}}) 00:49:13 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x25) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) sendto$inet(r1, &(0x7f0000000a00)="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", 0xffffffffffffff85, 0x0, 0x0, 0x0) 00:49:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/36) 00:49:13 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000100)=ANY=[@ANYRES32], 0x1}}, 0x40004) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) bind$netlink(r3, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000c80)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="92ad32a9dbda7a477f64c672903dc8be4970096fb4ca030cb52b1bac5dbdf76ca021920a095008eff7789e", @ANYRES16=r1, @ANYRESDEC=r1, @ANYRES16=r2, @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64], @ANYBLOB="68b9472fa3257e9e4a840f96f8a63c8a64b736cb75f5c843937c649c8cdb1a9744c2e2673df9eb7bc6c2a87cbb9fc10858aa7035f0cc5f721eafdb871d0be9d4e6265f50032b8228d3686d5e160632a863724f56b70b659f5e410cf58d6ca630dc3995f4ec173745e935be3d2fb0ed3778e3b7b5331321a59b5d0be6f1150b4f81809658480aec423c9835cec2e3798d079ca08dba3660a2a50457a47c3dd15546919234780d996c4f6b8f546db9829abee3f0f0133f0b9f8b91bcc55bff51a46b2a6a562c8ca81b73a969e18743ff9965c0790d2a960cf4f972441169892fffb3f2ebefd56e0777aad989181f692ea7d238e831e461ececca1f43b0", @ANYRESOCT, @ANYRES16], @ANYBLOB="000228bd7000ffdbdf250500800000080001000001000008007a0003e400000400020008000100ffff000028000200040004000800020002000000040004000400040008000200010000000008000100caa700000800010008000000080001000300000004000200080001000200000004000200040009009cbba7d2497c5c0d93efb0985f9fd2c52af45d13f01e5413c61c75c936ae0f2675f2c3a0614c9b64332c218bcd0bea55a7757b018da77d72ef8c17e7bd44053d2b429fdb0b1179639fe22e0b7d4dfbd1b9de6f6544769deb66681f9fff75b9"], 0x2}}, 0x8011) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') pipe2(&(0x7f0000000400), 0x80000) r11 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r12, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r12, 0xa, 0x12) recvmmsg(r13, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r12, r13) fcntl$setown(r13, 0x8, r11) tkill(r11, 0x16) syz_open_procfs(r11, &(0x7f0000000800)='net/if_inet6\x00') r14 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) r15 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$FICLONE(r15, 0x40049409, r14) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, 0x0) r16 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r16, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r16, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r16, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r16, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r16, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x10001, @ipv4={[], [], @empty}, 0x6}}, 0x0, 0x4, 0x0, "5f1fbd815daad4ebe0c69d63b32e82ce2c7e166c80fea17961c1d534fdafab3bc5108eeff64dbebeed4df9d008083e91795df7441bdad6f99c99155492aceb230e399822137dd9b078b976cfdf22c87c"}, 0xd8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r16, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r17+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) io_setup(0x0, &(0x7f0000000080)=0x0) pipe(0x0) io_submit(r18, 0x1, &(0x7f0000000040)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r19 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(r19, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) socketpair(0x2, 0xd, 0x4c, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000b80)=""/250, 0xfffffffffffffef7) 00:49:13 executing program 1: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) clock_settime(0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) getpid() syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$tipc(0x0) open(&(0x7f0000000140)='./file0\x00', 0x100, 0x0) lstat(0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000080)) lstat(0x0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fchdir(r6) socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup2(r9, r8) dup2(r10, r7) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r11, 0x407, 0x0) pipe(&(0x7f0000000300)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@empty}, 0x0, @in=@dev}}, 0x0) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000101fc7e728bba7e3b20c0203"], 0xf}}, 0x0) mount$fuseblk(&(0x7f0000000800)='/dev/loop0\x00', &(0x7f0000000340)='./bus\x00', &(0x7f00000007c0)='fuseblk\x00', 0x1a01010, &(0x7f00000003c0)=ANY=[]) r13 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x40, 0x40}, {0x80000006, 0x0, 0x1}]}, 0x8) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r15 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r15, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r14, 0x0, r15, 0x0, 0x30005, 0x0) socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r16) fsetxattr$system_posix_acl(r13, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRESOCT=r16], @ANYRES32, @ANYBLOB='\b@\b', @ANYRES32=r5, @ANYRES64, @ANYRES32=0x0, @ANYRESHEX=r4, @ANYRES32=0x0, @ANYBLOB="100004000000000020000600000000"], 0xa, 0x0) 00:49:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000680), 0x1e7) r2 = socket$inet6(0xa, 0x2, 0x0) close(r2) 00:49:13 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "1200000006c46f0006000000070000003c9f0300000000000000c2080000000061f071f50aec5843"}, 0x38) 00:49:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x7, 0x9) 00:49:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, 0x0, 0x0) close(r1) io_setup(0x5, &(0x7f0000001200)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 00:49:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score_adj\x00') lseek(r0, 0xfffffffffffffffc, 0x4) 00:49:16 executing program 0: r0 = socket$inet(0x11, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x108, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xfffffffd, 0x4) sendmsg(r0, &(0x7f000087dfc8)={&(0x7f000005e000)=@nfc_llcp={0x27, 0x3, 0x0, 0x0, 0x0, 0x0, "66caba280fe2ae105f7833b104d587ca55e7ef5ac507e2d516c12cf600fbebdddda9cd03d17da71743118d570a1eb7307d6a2ddd53b7cad8b654d380d8190e"}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x2000) 00:49:16 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "1200000006c46f0006000000070000003c9f0300000000000000c2080000000061f071f50aec5843"}, 0x38) 00:49:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_TXQLEN={0x8, 0xd, 0xfeffffff}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 00:49:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, 0x0, 0x0) close(r1) io_setup(0x5, &(0x7f0000001200)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 00:49:16 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x4fff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'eql\x00'}) dup3(r0, r2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, 0x0) 00:49:16 executing program 5: syslog(0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x0, 0x300) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r2, 0x107, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x40005) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4b, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0xfffffffffffffffc, @dev, 0x5}, 0x1c) socket$inet6(0xa, 0x0, 0x0) open(0x0, 0x646cf1e7e17347ea, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_ifreq(r4, 0x890b, &(0x7f00000002c0)={'if\xff\xff\xff\x7f\x00', @ifru_flags}) 00:49:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 3409.671769] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. 00:49:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x40000000000025d, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) syncfs(0xffffffffffffffff) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x26) 00:49:16 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "1200000006c46f0006000000070000003c9f0300000000000000c2080000000061f071f50aec5843"}, 0x38) 00:49:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, 0x0, 0x0) close(r1) io_setup(0x5, &(0x7f0000001200)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 00:49:16 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) 00:49:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) 00:49:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x40000000000025d, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) syncfs(0xffffffffffffffff) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x26) [ 3410.604708] audit_printk_skb: 1668 callbacks suppressed [ 3410.604716] audit: type=1400 audit(1574988557.503:412079): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x13) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000040), 0x0}, 0x20) 00:49:17 executing program 3: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000300)={'system_u:object_r:auditd_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x693}, 0x66) [ 3410.610764] audit: type=1400 audit(1574988557.503:412080): avc: denied { map_create } for pid=12756 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:49:18 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x64) [ 3410.612157] audit: type=1400 audit(1574988557.493:412078): avc: denied { net_admin } for pid=12727 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3410.612482] audit: type=1400 audit(1574988557.493:412077): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3410.614398] audit: type=1400 audit(1574988557.503:412081): avc: denied { map_read map_write } for pid=12756 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:49:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081808) syz_genetlink_get_family_id$tipc(0x0) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x18f) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) fcntl$setstatus(r0, 0x4, 0x42800) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000500)={0x18, 0x0, &(0x7f0000000180)=[@request_death, @release], 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) getsockname$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 00:49:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffffd4}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000280)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) 00:49:18 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self//exe\x00', 0x3, 0x0) r0 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000007140)=""/122, 0x7a) 00:49:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x2, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) [ 3410.623824] audit: type=1400 audit(1574988557.513:412082): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x400014) [ 3410.651797] audit: type=1400 audit(1574988557.543:412083): avc: denied { dac_override } for pid=12744 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3410.656223] audit: type=1400 audit(1574988557.553:412084): avc: denied { dac_override } for pid=12744 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3410.657208] audit: type=1400 audit(1574988557.553:412085): avc: denied { dac_override } for pid=12744 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3410.668206] audit: type=1400 audit(1574988557.563:412086): avc: denied { net_raw } for pid=12735 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3411.960404] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:49:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, 0x0, 0x0) close(r1) io_setup(0x5, &(0x7f0000001200)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 00:49:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 00:49:19 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x8}, 0x2d) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) listen(r0, 0x0) 00:49:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x40000000000025d, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) syncfs(0xffffffffffffffff) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x26) 00:49:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000900)='net/dev\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 00:49:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='c_pe\xff\xff\xff\xff\xff\xff\xff\xff\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) read(r1, &(0x7f0000000080)=""/251, 0xfb) 00:49:19 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r0 = syz_open_dev$evdev(&(0x7f0000001200)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/120) 00:49:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081808) syz_genetlink_get_family_id$tipc(0x0) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x18f) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) fcntl$setstatus(r0, 0x4, 0x42800) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000500)={0x18, 0x0, &(0x7f0000000180)=[@request_death, @release], 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) getsockname$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 00:49:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x2, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/193, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f5, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 00:49:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x1, 0x145002) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 00:49:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='c_pe\xff\xff\xff\xff\xff\xff\xff\xff\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) read(r1, &(0x7f0000000080)=""/251, 0xfb) 00:49:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x40000000000025d, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) syncfs(0xffffffffffffffff) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x26) 00:49:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8001b00000000000000000000080009000d000000", 0x24) 00:49:20 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2c80, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x51d00) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f00000019c0)=[0x0, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0xdf9b, 0x0, 0x3}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x5}]) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 00:49:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:49:20 executing program 3: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000380)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000a080800418e00000004fcff", 0x58}], 0x1) 00:49:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:49:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='c_pe\xff\xff\xff\xff\xff\xff\xff\xff\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) read(r1, &(0x7f0000000080)=""/251, 0xfb) 00:49:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:49:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081808) syz_genetlink_get_family_id$tipc(0x0) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x18f) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) fcntl$setstatus(r0, 0x4, 0x42800) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000500)={0x18, 0x0, &(0x7f0000000180)=[@request_death, @release], 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) getsockname$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 00:49:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 00:49:21 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = gettid() pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000140)="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"/297, 0x3accf8d5) ptrace(0x4206, r0) tkill(r0, 0x800000009) 00:49:21 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x2000000000007, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0xff, 0x10000, 0xff, 0x0, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000200)={0x0, 0x7530}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000280)='./file0\x00', 0x110000141042, 0x0) setsockopt$inet6_int(r2, 0x29, 0x46, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, 0x6, {0xd88, 0x4, 0xffffffff}}, 0x20) r5 = dup(r4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$9p(r5, &(0x7f00000002c0), 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x1f3) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ftruncate(r3, 0x10099b3) sendfile(r1, r3, 0x0, 0x88000fc000000) 00:49:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='c_pe\xff\xff\xff\xff\xff\xff\xff\xff\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) read(r1, &(0x7f0000000080)=""/251, 0xfb) 00:49:21 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2c80, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x51d00) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f00000019c0)=[0x0, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0xdf9b, 0x0, 0x3}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x5}]) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="3a6490014ed8bcccfd09ab4a287b2590f98e81ff26e1bd6ab7d3228d8928ecbe564ce81bc2a68679c44f2161ad6887aeb3d7f313c5590eef3b5421e461db735346fbade30aee3215087c17db6b8e7c4581ecda22283459f3de4578dd3dfa462344d0a64acf22396f61b28c380ea7ad4c4a731a12d92eef4a450a2b573c5788f8322a2af1db584ded1801d57b5ce655810ccdcc347a5c816a1f315c0e227bdf66119ea397ae397fbb8c6ea3fa12c687c2b31afad910d5b228ed6a181d0d2117759e9500cb1a630e98b032fcb19e0d05ddba1312f3d2ef36d15455345249cd5bcd28abf990dbaf44ea6daff4b7a1f79b01384379d01b4bf185e72c16f8f4795a5a") 00:49:22 executing program 1: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) 00:49:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000008480)=[{{&(0x7f0000000100)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{&(0x7f0000001340)={0x2, 0x4e24}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x8, 0x0, 0x0, [{}]}]}}}], 0x14}}], 0x2, 0x0) 00:49:22 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/210, 0xd2}], 0x1}}], 0x1, 0x0, &(0x7f00000071c0)={0x77359400}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 00:49:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) 00:49:22 executing program 0: setrlimit(0x40000000000008, &(0x7f0000000040)) mlockall(0x3) [ 3415.617546] audit_printk_skb: 2815 callbacks suppressed [ 3415.617555] audit: type=1400 audit(1574988562.513:413025): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:22 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r2, 0x1000000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r4, r2, 0x0, 0xfffffdef) pipe(&(0x7f00000005c0)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) ioctl$UI_DEV_CREATE(r5, 0x5501) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r6 = dup(0xffffffffffffffff) openat(r6, &(0x7f0000000340)='./file0\x00', 0x0, 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{0x10, 0x1, 0xb7d8}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x20000, 0x0) r8 = fcntl$dupfd(r1, 0x80c, r7) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'netdevsim0\x00', 0x3}, 0x18) socket$netlink(0x10, 0x3, 0x4000000000000004) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) dup(r9) [ 3415.640082] audit: type=1400 audit(1574988562.533:413026): avc: denied { dac_override } for pid=12879 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.660309] audit: type=1400 audit(1574988562.553:413027): avc: denied { read } for pid=12897 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3415.675486] audit: type=1400 audit(1574988562.563:413028): avc: denied { sys_admin } for pid=12902 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.680582] audit: type=1400 audit(1574988562.573:413029): avc: denied { dac_override } for pid=12902 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.682606] audit: type=1400 audit(1574988562.573:413030): avc: denied { dac_override } for pid=12902 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.686715] audit: type=1400 audit(1574988562.583:413031): avc: denied { sys_chroot } for pid=12902 comm="syz-executor.1" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.710885] audit: type=1400 audit(1574988562.603:413032): avc: denied { sys_admin } for pid=12902 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.722678] audit: type=1400 audit(1574988562.613:413033): avc: denied { sys_admin } for pid=12902 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3415.726263] audit: type=1400 audit(1574988562.623:413034): avc: denied { dac_override } for pid=12899 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3416.189225] input: syz0 as /devices/virtual/input/input503 00:49:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081808) syz_genetlink_get_family_id$tipc(0x0) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x18f) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) fcntl$setstatus(r0, 0x4, 0x42800) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000500)={0x18, 0x0, &(0x7f0000000180)=[@request_death, @release], 0x0, 0x0, 0x0}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) getsockname$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000004c0)=0x1c) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) 00:49:23 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/210, 0xd2}], 0x1}}], 0x1, 0x0, &(0x7f00000071c0)={0x77359400}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 00:49:23 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2c80, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x51d00) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f00000019c0)=[0x0, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0xdf9b, 0x0, 0x3}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x5}]) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 00:49:23 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e000000a7000000000000009500140000000000b1d8be4c8c0cbb5c2de1eb092afc8c1bb98d0080ca74cfea3cb8c97d0000009a3c606bf06c8b3e3c156753c1f35ae395008c37944691bf9bf67fdb84e2de6e02ce06b7d3c1ac58a3e60336df0c464cb9a9f3d6010000000100000009b3250e72711a3f7483cf6f0a8bfb85b2670d8223b5927fdfab8811ff20863b677bb18103da13f53259ff0ac6967e1f957f9867357f6a3f711ea2bb58093bc8693301a060dd8cc7e31dec56a29fbe4e38215b244f75af7a5df4b7b3a66ec5ed939286ace93e5c5d7cd5f8958f572f8141f6900061dee6a32b4bde85ddb768289fe21a4dae9bcbd8ca8cfa60f4c2a4ccb4c3be4ab5dcb4f188c66fc996c39b2bd9e55e1d7e44b48d3423386e960039dc01f91a463d68aa30d3e8e6d7eda3b90e673eaa751fc8158cc5df3bfa509ca2150256c3c4f6fe3954444519c3e7b3b3163217b73bc9d3654a4af9b8f2d1bc2de3ad0489eb3a35a0c863e69aee986cfdfbd3c45986c4025b1398a283db70455558a6d5efee54505ed5f44e1575c44f754519f4000100000000000073e65ee249f5eee1d5f2f5f79730295cf34b7903df1c090029002860e26edf2d09dccba29ff337dacd4ee90dd6c7ec7a0e0000000000000000000000998801725b79a54fdfba121e20bd33580af0f4b41ac931900e182241734a3c601155571db932e4f8d479282b2686bc8732e94106aeeca6a19236dac25864fdc359d82cd10519a77d240000000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x88001) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4e68d5f8) 00:49:23 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)="f4"}) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000014) clone(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0) [ 3416.858619] input: syz0 as /devices/virtual/input/input504 [ 3416.975733] binder: 12936:12939 ioctl 40046205 0 returned -22 00:49:23 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r2, 0x1000000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r4, r2, 0x0, 0xfffffdef) pipe(&(0x7f00000005c0)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) ioctl$UI_DEV_CREATE(r5, 0x5501) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r6 = dup(0xffffffffffffffff) openat(r6, &(0x7f0000000340)='./file0\x00', 0x0, 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{0x10, 0x1, 0xb7d8}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x20000, 0x0) r8 = fcntl$dupfd(r1, 0x80c, r7) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'netdevsim0\x00', 0x3}, 0x18) socket$netlink(0x10, 0x3, 0x4000000000000004) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) dup(r9) 00:49:24 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001680)='/dev/ashmem\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x299) socket$packet(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000840)=""/70) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x3, @dev, 0x4}, 0x1c) ioctl$void(0xffffffffffffffff, 0xc0045c78) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x1) fcntl$setstatus(r7, 0x4, 0x6100) r8 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r7, r8, 0x0, 0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) getsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000780)=""/164, &(0x7f0000000500)=0xa4) request_key(0x0, 0x0, &(0x7f0000001540)='trusted.overlay.redirect\x00', 0xfffffffffffffff9) setns(r5, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0x0, 0x0, 0x10001}, 0xc) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$unix(r9, &(0x7f0000000480)=@file={0x1, './file1\x00'}, 0x6e) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x14, 0x0, 0x0) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r13 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r13, 0x0, 0x15, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESOCT=r11, @ANYRES64, @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYRES16=r12, @ANYBLOB="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", @ANYRES16=0x0, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r13, @ANYPTR64], @ANYRESDEC=r8, @ANYRES16=r0, @ANYRESHEX=0x0], @ANYRES64=r1], 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000580)={{{@in=@dev, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xfffffffffffffe72) 00:49:24 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/210, 0xd2}], 0x1}}], 0x1, 0x0, &(0x7f00000071c0)={0x77359400}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 3417.115101] binder: 12936:12939 ioctl 40046205 0 returned -22 [ 3417.565932] input: syz0 as /devices/virtual/input/input505 00:49:24 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/210, 0xd2}], 0x1}}], 0x1, 0x0, &(0x7f00000071c0)={0x77359400}) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 00:49:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000001c0)=0x1, 0x4) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) r8 = openat(r4, &(0x7f00000003c0)='./file0\x00', 0x101001, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x0, @mcast2}}}, 0x84) io_setup(0xc2, &(0x7f0000000100)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000180)=0x84c5) syz_open_procfs(r7, 0x0) unshare(0x4040000000) r9 = creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000440), &(0x7f0000000480)=0x8) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000800)="888b9e05ff2c84a958ab36ed1e0e99e50f750e4b37f542e10eaf5c129ddd", 0x1e, 0xfffffffffffffffd) r13 = add_key(&(0x7f0000000840)='trusted\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="a4a0017f01ef10aa77f7eff34a0d19e66a4ea3d09f396f1e017cdddba34c62bedf6684100c3f80ca579611a7871dee0fe31c21e84279e4c7df39e3b38a975f2a3161d2863e5f75f95e1312c7e7d3545c38d67803aaef89f2775d5c9ab02619da479013bc850aae2ed39553e386f0e9aa2592cdb026933a8bea20e12cf579105700c732dd299844f9ed46144d0bd674c1b32e0671f58db323096cada475a75dcc9e", 0xa1, 0xfffffffffffffffc) keyctl$negate(0xd, r12, 0x0, r13) r14 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) pwritev(r14, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r10, r14, &(0x7f0000000240), 0xffffffffffff7509) sendfile(r10, r14, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r11, &(0x7f0000000040)=""/4, 0x5702e87367624ebf, 0x3f00, &(0x7f0000000100)=@abs, 0xffffff8c) ftruncate(r4, 0x100) write$binfmt_elf64(r9, 0x0, 0x0) 00:49:25 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:25 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2c80, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) r1 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x51d00) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x5, &(0x7f00000019c0)=[0x0, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0xdf9b, 0x0, 0x3}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff, &(0x7f0000001800), 0x0, 0x0, 0x0, 0x5}]) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r4, r5, 0x0, 0x80000001) syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 00:49:26 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:26 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:26 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001680)='/dev/ashmem\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x299) socket$packet(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000840)=""/70) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x3, @dev, 0x4}, 0x1c) ioctl$void(0xffffffffffffffff, 0xc0045c78) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x1) fcntl$setstatus(r7, 0x4, 0x6100) r8 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r7, r8, 0x0, 0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) getsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000780)=""/164, &(0x7f0000000500)=0xa4) request_key(0x0, 0x0, &(0x7f0000001540)='trusted.overlay.redirect\x00', 0xfffffffffffffff9) setns(r5, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0x0, 0x0, 0x10001}, 0xc) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$unix(r9, &(0x7f0000000480)=@file={0x1, './file1\x00'}, 0x6e) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x14, 0x0, 0x0) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r13 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r13, 0x0, 0x15, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESOCT=r11, @ANYRES64, @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYRES16=r12, @ANYBLOB="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", @ANYRES16=0x0, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r13, @ANYPTR64], @ANYRESDEC=r8, @ANYRES16=r0, @ANYRESHEX=0x0], @ANYRES64=r1], 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000580)={{{@in=@dev, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xfffffffffffffe72) 00:49:26 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) 00:49:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000001c0)=0x1, 0x4) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) r8 = openat(r4, &(0x7f00000003c0)='./file0\x00', 0x101001, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x0, @mcast2}}}, 0x84) io_setup(0xc2, &(0x7f0000000100)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000180)=0x84c5) syz_open_procfs(r7, 0x0) unshare(0x4040000000) r9 = creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000440), &(0x7f0000000480)=0x8) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000800)="888b9e05ff2c84a958ab36ed1e0e99e50f750e4b37f542e10eaf5c129ddd", 0x1e, 0xfffffffffffffffd) r13 = add_key(&(0x7f0000000840)='trusted\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="a4a0017f01ef10aa77f7eff34a0d19e66a4ea3d09f396f1e017cdddba34c62bedf6684100c3f80ca579611a7871dee0fe31c21e84279e4c7df39e3b38a975f2a3161d2863e5f75f95e1312c7e7d3545c38d67803aaef89f2775d5c9ab02619da479013bc850aae2ed39553e386f0e9aa2592cdb026933a8bea20e12cf579105700c732dd299844f9ed46144d0bd674c1b32e0671f58db323096cada475a75dcc9e", 0xa1, 0xfffffffffffffffc) keyctl$negate(0xd, r12, 0x0, r13) r14 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) pwritev(r14, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r10, r14, &(0x7f0000000240), 0xffffffffffff7509) sendfile(r10, r14, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r11, &(0x7f0000000040)=""/4, 0x5702e87367624ebf, 0x3f00, &(0x7f0000000100)=@abs, 0xffffff8c) ftruncate(r4, 0x100) write$binfmt_elf64(r9, 0x0, 0x0) 00:49:26 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r2, 0x1000000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r4, r2, 0x0, 0xfffffdef) pipe(&(0x7f00000005c0)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) ioctl$UI_DEV_CREATE(r5, 0x5501) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r6 = dup(0xffffffffffffffff) openat(r6, &(0x7f0000000340)='./file0\x00', 0x0, 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{0x10, 0x1, 0xb7d8}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x20000, 0x0) r8 = fcntl$dupfd(r1, 0x80c, r7) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'netdevsim0\x00', 0x3}, 0x18) socket$netlink(0x10, 0x3, 0x4000000000000004) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) dup(r9) [ 3420.269367] input: syz0 as /devices/virtual/input/input506 [ 3420.336812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13023 comm=syz-executor.2 [ 3420.639298] audit_printk_skb: 2106 callbacks suppressed [ 3420.639308] audit: type=1400 audit(1574988567.533:413737): avc: denied { net_admin } for pid=13018 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001680)='/dev/ashmem\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x299) socket$packet(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000840)=""/70) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x3, @dev, 0x4}, 0x1c) ioctl$void(0xffffffffffffffff, 0xc0045c78) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x1) fcntl$setstatus(r7, 0x4, 0x6100) r8 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r7, r8, 0x0, 0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) getsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000780)=""/164, &(0x7f0000000500)=0xa4) request_key(0x0, 0x0, &(0x7f0000001540)='trusted.overlay.redirect\x00', 0xfffffffffffffff9) setns(r5, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0x0, 0x0, 0x10001}, 0xc) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$unix(r9, &(0x7f0000000480)=@file={0x1, './file1\x00'}, 0x6e) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x14, 0x0, 0x0) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r13 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r13, 0x0, 0x15, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESOCT=r11, @ANYRES64, @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYRES16=r12, @ANYBLOB="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", @ANYRES16=0x0, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r13, @ANYPTR64], @ANYRESDEC=r8, @ANYRES16=r0, @ANYRESHEX=0x0], @ANYRES64=r1], 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000580)={{{@in=@dev, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xfffffffffffffe72) 00:49:28 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3420.644924] audit: type=1400 audit(1574988567.543:413738): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:28 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r2, 0x1000000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000001540)='cgroup.subtree_control\x00', 0x2, 0x0) sendfile(r4, r2, 0x0, 0xfffffdef) pipe(&(0x7f00000005c0)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) ioctl$UI_DEV_CREATE(r5, 0x5501) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r6 = dup(0xffffffffffffffff) openat(r6, &(0x7f0000000340)='./file0\x00', 0x0, 0x10) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{0x10, 0x1, 0xb7d8}, 'syz0\x00\x00\x00\x00\x00\x80\xa017\b\xec\xd6#\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00q\xab\x94%\x00\x00\xff\xff\xff\xff\xff\xff\xff\xe7\x00'}) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x20000, 0x0) r8 = fcntl$dupfd(r1, 0x80c, r7) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'netdevsim0\x00', 0x3}, 0x18) socket$netlink(0x10, 0x3, 0x4000000000000004) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) dup(r9) [ 3420.646603] audit: type=1400 audit(1574988567.543:413739): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3420.648293] audit: type=1400 audit(1574988567.543:413740): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:29 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001680)='/dev/ashmem\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x299) socket$packet(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000840)=""/70) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x3, @dev, 0x4}, 0x1c) ioctl$void(0xffffffffffffffff, 0xc0045c78) r7 = creat(&(0x7f0000000100)='./file1\x00', 0x1) fcntl$setstatus(r7, 0x4, 0x6100) r8 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r7, r8, 0x0, 0x0) sendfile(r7, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) getsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000780)=""/164, &(0x7f0000000500)=0xa4) request_key(0x0, 0x0, &(0x7f0000001540)='trusted.overlay.redirect\x00', 0xfffffffffffffff9) setns(r5, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000180)={0x0, 0x0, 0x10001}, 0xc) r9 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$unix(r9, &(0x7f0000000480)=@file={0x1, './file1\x00'}, 0x6e) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') r10 = socket$inet6(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r11, 0x0, 0x14, 0x0, 0x0) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r13 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r13, 0x0, 0x15, 0x0, 0x0) socket$inet(0x2, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r10, 0x29, 0x41, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRESOCT=r11, @ANYRES64, @ANYPTR=&(0x7f0000000c40)=ANY=[@ANYRES16=r12, @ANYBLOB="b08c769e6a7a28e7c52dd74c40771962ce4fba81459874010a997b8e33eec1c0cb35d0321074affa496f888e9175e1f69742cf183b09ef73dc4920c9cdf9df6fa661c3ab6cdaa2ea816c78da1d155fde37753d3a0cae5967b095a6957fc0c6cf9af6bbae0c78a5b34cfef30748092a4ce2950c5318c6edb5101cf93976549db690a86c4699f8de2a62adbfcfe10a43be5539d13a6f44c30f72256c5fea0418f7b920cfd7db4971c9420a40bfb3cd04c2bd7d9a2e6cc5d7e6748328f27a67b2768159db2376a33343af3de2020a21dfa0507fb11a2288c60e3814f2c4485b65fd4aa6bbec721bb842b68023071d5f250da599617efac126b02c9459fc607482153e0000000000000000000000000000000013fc383e61fa06af812112c8a7831ccb273831c6c94476ba80c3d2e292a7799155e547f2ca338fc027d6713f98058d5e3121dd0da5f2f6d99892dc9954", @ANYRES16=0x0, @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r13, @ANYPTR64], @ANYRESDEC=r8, @ANYRES16=r0, @ANYRESHEX=0x0], @ANYRES64=r1], 0x5) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000580)={{{@in=@dev, @in=@initdev}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xfffffffffffffe72) 00:49:29 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3420.650076] audit: type=1400 audit(1574988567.543:413741): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:29 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3420.651794] audit: type=1400 audit(1574988567.543:413742): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3420.770758] audit: type=1400 audit(1574988567.663:413743): avc: denied { dac_override } for pid=13031 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:31 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3420.946047] audit: type=1400 audit(1574988567.843:413744): avc: denied { search } for pid=5260 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:smartcard_device_t:s0 tclass=dir permissive=1 [ 3420.950908] audit: type=1400 audit(1574988567.843:413745): avc: denied { search } for pid=469 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:smartcard_device_t:s0 tclass=dir permissive=1 [ 3420.960768] audit: type=1400 audit(1574988567.853:413746): avc: denied { search } for pid=5260 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:smartcard_device_t:s0 tclass=dir permissive=1 [ 3421.865907] input: syz0 as /devices/virtual/input/input507 00:49:31 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:31 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000001c0)=0x1, 0x4) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) r8 = openat(r4, &(0x7f00000003c0)='./file0\x00', 0x101001, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x0, @mcast2}}}, 0x84) io_setup(0xc2, &(0x7f0000000100)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000180)=0x84c5) syz_open_procfs(r7, 0x0) unshare(0x4040000000) r9 = creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000440), &(0x7f0000000480)=0x8) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000800)="888b9e05ff2c84a958ab36ed1e0e99e50f750e4b37f542e10eaf5c129ddd", 0x1e, 0xfffffffffffffffd) r13 = add_key(&(0x7f0000000840)='trusted\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="a4a0017f01ef10aa77f7eff34a0d19e66a4ea3d09f396f1e017cdddba34c62bedf6684100c3f80ca579611a7871dee0fe31c21e84279e4c7df39e3b38a975f2a3161d2863e5f75f95e1312c7e7d3545c38d67803aaef89f2775d5c9ab02619da479013bc850aae2ed39553e386f0e9aa2592cdb026933a8bea20e12cf579105700c732dd299844f9ed46144d0bd674c1b32e0671f58db323096cada475a75dcc9e", 0xa1, 0xfffffffffffffffc) keyctl$negate(0xd, r12, 0x0, r13) r14 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) pwritev(r14, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r10, r14, &(0x7f0000000240), 0xffffffffffff7509) sendfile(r10, r14, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r11, &(0x7f0000000040)=""/4, 0x5702e87367624ebf, 0x3f00, &(0x7f0000000100)=@abs, 0xffffff8c) ftruncate(r4, 0x100) write$binfmt_elf64(r9, 0x0, 0x0) 00:49:31 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) 00:49:31 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:32 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3425.655754] audit_printk_skb: 1323 callbacks suppressed [ 3425.655762] audit: type=1400 audit(1574988572.553:414188): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.665490] audit: type=1400 audit(1574988572.553:414189): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.686702] audit: type=1400 audit(1574988572.593:414190): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.703747] audit: type=1400 audit(1574988572.593:414191): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:32 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:32 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3425.752358] audit: type=1400 audit(1574988572.643:414192): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.784194] audit: type=1400 audit(1574988572.673:414193): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.789833] audit: type=1400 audit(1574988572.683:414194): avc: denied { sys_admin } for pid=13101 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.845256] audit: type=1400 audit(1574988572.743:414195): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:33 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) [ 3425.847138] audit: type=1400 audit(1574988572.743:414196): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.849055] audit: type=1400 audit(1574988572.743:414197): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3425.946839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13111 comm=syz-executor.2 00:49:34 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:34 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:34 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) [ 3428.466921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13148 comm=syz-executor.1 [ 3428.491638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13140 comm=syz-executor.2 00:49:36 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) 00:49:36 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) 00:49:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000400)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0xffffff7e) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f00000001c0)=0x1, 0x4) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000980)) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) r8 = openat(r4, &(0x7f00000003c0)='./file0\x00', 0x101001, 0x10) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000500)={0x8, {{0xa, 0x4e21, 0x0, @mcast2}}}, 0x84) io_setup(0xc2, &(0x7f0000000100)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000180)=0x84c5) syz_open_procfs(r7, 0x0) unshare(0x4040000000) r9 = creat(&(0x7f0000000040)='./file1\x00', 0x0) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000440), &(0x7f0000000480)=0x8) socketpair$unix(0x1, 0x800000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000800)="888b9e05ff2c84a958ab36ed1e0e99e50f750e4b37f542e10eaf5c129ddd", 0x1e, 0xfffffffffffffffd) r13 = add_key(&(0x7f0000000840)='trusted\x00', &(0x7f0000000880)={'syz', 0x3}, &(0x7f00000008c0)="a4a0017f01ef10aa77f7eff34a0d19e66a4ea3d09f396f1e017cdddba34c62bedf6684100c3f80ca579611a7871dee0fe31c21e84279e4c7df39e3b38a975f2a3161d2863e5f75f95e1312c7e7d3545c38d67803aaef89f2775d5c9ab02619da479013bc850aae2ed39553e386f0e9aa2592cdb026933a8bea20e12cf579105700c732dd299844f9ed46144d0bd674c1b32e0671f58db323096cada475a75dcc9e", 0xa1, 0xfffffffffffffffc) keyctl$negate(0xd, r12, 0x0, r13) r14 = memfd_create(&(0x7f0000000600)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iqv\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x00\x00\x00\x00\x00\x00\x00\xae\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.g\x10H\xa8\xc9\x1f\xfc\x1e\xdfF\x16K\a@\x8c7\x1d!\xfd\xb0\xefW\x8f\xb8\x19\x8dS\xcer\x00SE\xdcD\xd2\x98\fy\x8dQ?7m\x9a\xe3\xca\xb0~\xdb*\xa7\xbf\xeftV\xa1\x94\x911\xa7\x8cYiY\xd2\xecF\xec\xb4/\xca\x97~^o\xd74\x11\'\xe1\xce\x06\xe1\xebV\xfd\xaa\x19\xd3\x14\xad\xea=o\xf2\x15g\xa9\xca\xa7\xc6\xd6\xaa\x86\xcc\x03\xcfD\xfe\x0f\xd4\xa7\x9f\xd8\n\x13T\x83\xdb\x19}\xf1\xa9\xac\x9eV\xb9\x15\x852\xfd\xaea\xff\xcb\x86d:\n\x85\x807]\x96\xb4\x96\xbc\xa6\xe6\x86\x80Gy\xfe\x8c\x1aV\xce\xb2h\xfd\xee*\xf0\xb3\xc38o\xac\x96Y\xa6\x81~\x8e\x8b@k\x7f\x88\xdd<}\x91\x83\xb0[\xff\xe3\xb9\xc6P\xd7\xc9\x87 \xef\xc9M\xa7\xbc\x1c\xa4~\x9b\xee\x94\x02&\x980\x10\x96\x96\\\x00\x00\x00\x00\x00', 0x0) pwritev(r14, &(0x7f0000000340)=[{&(0x7f0000000200)=',', 0x1}], 0x1, 0x4081806) sendfile(r10, r14, &(0x7f0000000240), 0xffffffffffff7509) sendfile(r10, r14, &(0x7f00000000c0), 0x20020102000007) recvfrom$unix(r11, &(0x7f0000000040)=""/4, 0x5702e87367624ebf, 0x3f00, &(0x7f0000000100)=@abs, 0xffffff8c) ftruncate(r4, 0x100) write$binfmt_elf64(r9, 0x0, 0x0) 00:49:36 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:36 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="05030200000000fb6c4b90ca800099c8317c23c95b800dfd30c65b22f40b1ef8b712a4cc322bd83d3a224f1f1340dcadaf8c354782b876f54e288e44d0f03b3b6ec519f69e9ca519cff7015aee595ae090793cabd8739cded4313f112e05e049abba507847f91ef04db519afacbdcd5840f14e427ac648ee21bb07cb5ec8e4014e8901d59440606b6c402fbfe673555edfe86a8c3c73827bc3f89027005d6909718ed3605d4529a232e418733b9389caec3db9d856f8778a2800000000004dcba60d0207de8dd1cbf0e348a5b5f080f0d5758814af6637db220242f35fa633892d89e34903a23b285c7f91a5cbfa9a9bd374f2c6652c89d8b12e892c196eeeb6d47e2c5387947df11226025e67e97e68faf9f9bd0009dbcf54c9"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="80f17a0b8c8970cad4e7c2198c830f262255157995a738328a6ea456e2363942b6223ced8e1d157847f0c1b27a6f790486384b94faefd0dfba2444691133054cc3c8e8e0c3448446a3c2b9f6f110a48d3902d829438729dc7496c17992daebf777fcec616e2ab5ee4386fc35ddb3c5be77d95c0fffaf93cd81c953d311d52830de1d0e9e0df27d08c3fd370198119340781d16aafdfe831593becee6a47cb0fc059d70333ded95e2eb745ff068798a7f26f16839020454432ad0db8fad8c6f345d112e5a6324307d2828ab93a8466da7e80f1a9a4e52857001931223755f7cfb153a98e80cf6b91cf3b9d6634bb2a11f78cc4b3e54a5ac1f17ba23f8eae550c41ab7fcfb549b1791b61093ef140b2b4974e454654ecf5d28797058e196c632fe4f8b71816b2e3c766121499ac4ccdabdbb8c2c57d4a2b5a2e123d0eba31d36285709a22bbdd00e1da947b486f23cdf7453fb1ea5a4775d4dd315e6555ca87c6326efe9bf74b8daecd441eec2ac284d3c062ca8db46acd4e54eafd2cfe5871feac2ba09f31813b44eb3de3515a7b702ee6e0858841ebaddbc8a01d8bfc444c7c0d5d9829a7f61063e31f4fbdef237ff9d4809dcb115c5ffd86af35d1d2edadae8d793a6a0b37adff41ba5a7188e3d46764a5f242fc20b3f44ec5d18ff251b231135c066b9ab5b889b0774613a5dc7a6d6ad5e2d6d095b610f674be6ac519c7d19be29ddccdfe3bf7ea744230ff61d1f3657407d2cc64a4a432cb843d91f98e39f96f47fbd513a12d4a40bd7e15b5910792bea8f197731950245000a99787b4d267c70852d07c94c280f17934214c64677bb5c3c6a996f4d20fbf54f520ed7575f66cd07aa2e14423134962f73d86bce9eb93c697f66adeb655b7898d1f9e66a045f421937f85c251cd510614d3f5f8ca6230d4e04e3e9f36f73f8484749ac03c6b657e81cc9a201817e44f8cad068d100c2ae02c521a83d7bd5f26d8eb9de2f769a356a4adbcbb4425f66293ad1f49851c233a3a64f474860bd6e78b9edb66e259358fd322140140341245fb111b95c9b2e4b6b63b82e711b59d65b06b70ec3ac731d916a5b9f3d4c84c63c4e25db1ca40b2662e0d03327ea4f82d4d19b65527d48859ae051f6c7726bd84ceb1f8c40cbaeb08ecd0fd6aa1367b62f4c41d85525b4c4d39c0f314d88bb1c63554c199bc5f2c8aed9d2b4e864e232107e28658a612fb8589105b00004308fe4635e3a20cc44ba33557a8c3dbba28d78c5390b6a1e292bbdd4ada2244c87a4135c9dd3a426908b9aeed9adff063fa6fc056b7587e3afc5390bd5f1069db6277e3a84282157c1d4fc8c9326efd496659955724cccf7f0ac6d767dfc9511bcc3b51ab7061a35a24310b1f7b0b003f132360fc2f0df5a0ccc27bcba0395fc3ff3842071f0a4dc2debdc1becfffc9f0519e323f5d9793274b0e5eac4be6da21055b44e3db6ab0bb550cfa7305a78a840e1e46b29ffc4f337b1c6165aaf284290f69a620fe2dc9cdc6db45dec913ab4d083d77207439e758c156a39299872b288c9f18d13e8ae0284e132ddf77140b4d4a1c8b5f2c93359efcf948dbd92338fa90641069b479ce2a2ade41edb50f32dbc746903fc41d9b6c0c478848f8c60e1c77a6fd41f4a859609b944350543a4694c913d8cd8ebf9209615b9a1b726d50e1ed2e810ccb2ed4340eb30d27b22120292057a8c11dc888825c97f2ba1d558246bc5d972c141eb8633592bd3246962f08a5595ae01220b7a78bc7a090d1ccc8613537f766e4e9602685bd00aa5ad7309f5883bcecd75b65b341508a5beee817be3fde4b38cc6da3be07776", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) [ 3429.408916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13155 comm=syz-executor.1 [ 3429.410208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13156 comm=syz-executor.0 00:49:36 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) 00:49:36 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) [ 3430.068333] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13160 comm=syz-executor.2 00:49:37 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) [ 3430.113181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13167 comm=syz-executor.0 00:49:37 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x47b, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000004c0)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r1, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) getpgrp(r2) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="38000000100400002737ec76921c3881dae274000000008aeb67e69689c8d3", @ANYRES32=r10, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r10}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000001000050700"/20, @ANYRES32=r6, @ANYBLOB="08000100767469000c8096218b060000", @ANYRES32=r10], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f00000002c0)={@ipv4={[], [], @dev}, 0x0, r6}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'eql\x00', r6}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) ioctl$KDDELIO(r0, 0x4b35, 0x38) socket(0x10, 0x2, 0x0) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x80000000000002, &(0x7f0000000280)=0x7b, 0x4) bind$inet(r11, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x1, 0x0, 0xe8}]}, 0x8) getxattr(0x0, 0x0, 0x0, 0x4f) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setxattr$security_evm(0x0, &(0x7f0000000480)='security.evm\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB="05030200000000fb6c4b90ca800099c8317c23c95b800dfd30c65b22f40b1ef8b712a4cc322bd83d3a224f1f1340dcadaf8c354782b876f54e288e44d0f03b3b6ec519f69e9ca519cff7015aee595ae090793cabd8739cded4313f112e05e049abba507847f91ef04db519afacbdcd5840f14e427ac648ee21bb07cb5ec8e4014e8901d59440606b6c402fbfe673555edfe86a8c3c73827bc3f89027005d6909718ed3605d4529a232e418733b9389caec3db9d856f8778a2800000000004dcba60d0207de8dd1cbf0e348a5b5f080f0d5758814af6637db220242f35fa633892d89e34903a23b285c7f91a5cbfa9a9bd374f2c6652c89d8b12e892c196eeeb6d47e2c5387947df11226025e67e97e68faf9f9bd0009dbcf54c9"], 0x1, 0x2) sendmsg(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x513}], 0x1, 0x0, 0x0, 0x800}, 0x0) shutdown(r11, 0x4000000000000001) recvmmsg(r11, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000ec0)=""/223, 0xdf}], 0x1, 0x0, 0x0, 0x7}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}}], 0x2, 0x0, 0x0) [ 3430.498200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13169 comm=syz-executor.1 [ 3430.688432] audit_printk_skb: 1404 callbacks suppressed [ 3430.688440] audit: type=1400 audit(1574988577.583:414666): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:37 executing program 1: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x2, 0x0) prctl$PR_GET_TID_ADDRESS(0x22, &(0x7f0000000180)) r1 = dup(r0) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x3, {0xbf1}}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) write$FUSE_LSEEK(r0, 0x0, 0x0) [ 3430.757940] audit: type=1400 audit(1574988577.653:414667): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.759828] audit: type=1400 audit(1574988577.653:414668): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:37 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) [ 3430.763189] audit: type=1400 audit(1574988577.653:414669): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.809677] audit: type=1400 audit(1574988577.703:414670): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.829650] audit: type=1400 audit(1574988577.723:414671): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.891028] audit: type=1400 audit(1574988577.783:414672): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.892910] audit: type=1400 audit(1574988577.783:414673): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.903351] audit: type=1400 audit(1574988577.793:414674): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3430.906184] audit: type=1400 audit(1574988577.803:414675): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3431.772772] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1040 sclass=netlink_route_socket pig=13197 comm=syz-executor.0 00:49:39 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x262980, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$unix(r4, &(0x7f0000000080)=@abs, 0x6e) bind$inet(r4, &(0x7f00000002c0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r4, &(0x7f0000000240)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80400001}, 0x14) shutdown(r4, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r5, 0x29, 0x39, &(0x7f0000000780)=ANY=[@ANYBLOB="00000200000000003b4d34238573ca351b3e6cc6f1ae0c9145be7e10277b107b197a911ba3c79d016d05e431d0d0ec009419f77e3710217cb295132456e44cc125b4172d3da8254fcd31773a06a1615669b378aaa0ae87fcf6f3fe2f007df05bf2ad7eb6ae817ed7f1d930c1ba04ff7736865380efd7829f53c3e4734c478ee52cb092d55ea4d61127dc3b33a79f2c2a4d01d85db323ac8714081cd0d543a54ae8eb0c997acb4d397fb8a5f14d6a528b7ee60800000000000000e74b56f08c6bd487e42d1de00e0f089246713304e0cf4d58eb9352083878f11fabe74437b7fce48baa56f7aec35d1fdf95cafc1adffa395e62cebe62af42075d008ef09b4c3358f3b89a219cf6756a0a2e615ea36fe3920d95019238c939f5fcb8423861e0e20ab614dd15d9"], 0x8) setsockopt$IP_VS_SO_SET_EDIT(r4, 0x0, 0x483, &(0x7f0000002680)={0x3b, @loopback, 0x4e21, 0x0, 'rr\x00', 0x2c, 0x3, 0xa}, 0x2c) r6 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xfffffffffffffcb8) fstat(r6, &(0x7f0000000ac0)) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') lseek(r7, 0x3, 0x1) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') lseek(r8, 0x3, 0x1) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}]}, 0x78}}, 0x0) 00:49:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 00:49:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 00:49:39 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1fffffffffffff9e}, 0xa) pipe(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xc867076f160aa902) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) epoll_create1(0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x20000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) signalfd4(0xffffffffffffffff, &(0x7f0000000840)={0x6}, 0x8, 0x0) ioprio_get$uid(0x400000000003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000240)=""/35, 0x23) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000240)=""/35, 0x23) getdents64(r5, &(0x7f0000000080)=""/197, 0xc5) tee(r4, r5, 0x101, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000001040)=[{0x0}], 0x1}, 0x5}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast2, @mcast2, 0x57, 0x10001, 0x0, 0x500, 0xfffffffffffffffb}) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="ee07bc5ef1aeddad2beec8b5425d0e2c1f97ca0b3f3be3fd23f906ae553db19c6df25f677613d3563323731566e43ce1e2bd312a6696a60e0912dded66b4ef91aa20b5922bf32401f75e56b9f834eec3c9e311aecc1fadb691d93cb8057b59fb69826d926eb3a76151a9a0d83fb5ef6378e3d7717d6f7f9ee994198fb8ba956be6f52e8b6914793365e0b01c2dd75c92ffc04533333ab1acdf0cc4729602d5248f2f8007dbd77a78b818960e7587f28b4dc1a2fe8c768308d4d4bb293cf8c0521f0000000000", @ANYRES16=0x0, @ANYBLOB="00002dbd7000fedbdf25130000001800020004000400080002000000c0ce08000200000200"], 0x3}}, 0x801) 00:49:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000006440)=[{{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000003080)=""/209, 0xd1}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3cc, 0x0) 00:49:39 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:49:39 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 00:49:40 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:49:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 00:49:40 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 3433.613390] input: syz1 as /devices/virtual/input/input508 00:49:40 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 00:49:40 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:49:41 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:49:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 00:49:41 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:49:42 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000540)=@generic={0x3}) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) linkat(r0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x40000000008004, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) lsetxattr(&(0x7f0000000240)='./bus\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="f6b4617d3d4e9e29a0f80d4a75930ccf019401000000886875e1eab05ea9ff481ef6340200000000040000bc27c8f0fe581ef1c1be30f5a5e7cc7d8b88e962b8c2d9e4aa3775abbb75d0e1163d63ef66937a0145765241a94a878e95a29fc35b43818e9bb7881b43738efe41111974fe1607b765eef9ba0c9e270141bfceffffff7f00000000b7c41dc8f27bc8d1f316f72518b7c7f6d551d813771a4306"], 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)) lseek(r4, 0x0, 0x2) ioctl$VT_ACTIVATE(r3, 0x5606, 0x1) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) write(r1, &(0x7f00000000c0)="8aec592344b8776fcc12640aa7cd9a6107f8c1362aa042ade4d2f75310142645d5e57475f85fdd39978588cd3730", 0x2e) ftruncate(0xffffffffffffffff, 0x6) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = getpid() recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r6, 0x0, 0x24000000) fsetxattr$security_ima(r6, &(0x7f0000000040)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR]], 0x1, 0x1) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x7fffffff, 0x0, 0x7ff, 0xfffffffffffffff9, 0x0, 0x1, 0x0, 0x4, 0x800, 0xcb, 0x2, 0x0, 0x100000000, 0x2, 0x0, 0x5, 0x0, 0x100000001, 0x3, 0x200, 0x3ff, 0x0, 0x0, 0x54, 0x5, 0x1, 0x6, 0x0, 0x67d, 0x7, 0x0, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x2}, 0xac00, 0x2, 0x100000000, 0x0, 0x0, 0x8, 0x20}, r7, 0x1, r6, 0x2) creat(&(0x7f0000000280)='./bus\x00', 0x0) 00:49:42 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 00:49:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x40141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x7fffff, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r1, 0xffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x1000000000000199}, 0x438) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xfffffffffffffcbc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='mem\x00\x01y\x00\x00\x00\x00\x00\x00\x00\ar\x89\xc9B\xab\xe3\xfar\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) [ 3435.694532] audit_printk_skb: 1515 callbacks suppressed [ 3435.694540] audit: type=1400 audit(1574988582.593:415182): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3435.707935] audit: type=1400 audit(1574988582.593:415183): avc: denied { dac_override } for pid=13251 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3435.711194] audit: type=1400 audit(1574988582.583:415181): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:43 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 00:49:43 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 3435.716168] audit: type=1400 audit(1574988582.593:415184): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:43 executing program 0: socket$unix(0x1, 0x5, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) listen(0xffffffffffffffff, 0x4) wait4(0x0, &(0x7f00000000c0), 0x6000000a, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB], 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000023c0)={'sit0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8000001b, &(0x7f0000002400)={@local}, &(0x7f0000002440)=0xf) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', r3}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000029c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002a80)={'rose0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002b40)={@loopback}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002bc0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, 0x0) accept4$packet(r1, 0x0, &(0x7f0000002e00), 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e40)={{{@in=@empty}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003100)=0xe8) r4 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0xa4bcd6ca7f9c8017) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000033c0)=0xe8) r5 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r5, 0x0, 0x62, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, 0x0) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(r1, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000038c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@remote}, 0x0, @in6=@empty}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000003c00)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004240)={'team0\x00'}) r6 = open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f00000044c0)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004500)={0x0, @empty}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000004700)) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0xb1fd1f21d4b43693) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendto$inet(r2, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r7 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r7, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) write$binfmt_script(r8, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/996], 0xfffffffffffffd1a) setsockopt$sock_int(r2, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 3435.730782] audit: type=1400 audit(1574988582.623:415185): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:43 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000009c0)="44f04c97cfc7e5998f920eba1ce576133998d39f2641959b6f55a3d18aeb0656088ca075000000000000000000000061b86c30c8e19e013a19a1240c3772c2749905a47433eb972c1eca9bd115ed111f43196a3b1bc35a3675a95b6b41e3b3386003d359d9f29e9b703ec55345ad91aa8c3701000000d0f46f9aac8d6c4e102390d76e397ad8dfaad8c0a2970e453521f1729111200580ed433bd4fb276df0bb9c400ed9a1d38a197750832d3b10484ae96620b1f6214bc043", 0x7c000000) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) setns(r1, 0x8000000) fchdir(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x64, 0x6}}) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x4000080) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = open(&(0x7f0000000480)='./bus\x00', 0x141046, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00E8\xddV\x82li\x1d/y6\xa2\xea\xff7\xcaz\xb1\x04\xa5\x14[\x1d+5B\\q.\x11\x91Y\xe0\xcb\xc5.$\x13h\xac\x89\xca\x86\x11\x03\x1c\x9d\x06KB\x05,\x84>\x84i\x10\x96\xf1BC\xb31\x7f\x96\x7f\x82\"2\x00\x00\x00\x00\x00') ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x101}) linkat(r5, &(0x7f0000000080)='./bus\x00', r1, &(0x7f0000000300)='./bus\x00', 0x400) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000940)=@v1={0x0, @aes256, 0xa88c61559dee0c38}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000580)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) ioctl$TUNSETSTEERINGEBPF(r6, 0x400454d1, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000007c0)=ANY=[@ANYRESOCT=r6, @ANYRES16, @ANYBLOB="ae11c0073580af7f519d8bbaf06ea2c2517516145d461fb1c46490a807580d45a66e069fcad7951cfdab77852ad4030005450a8c4f93ca1522e0803e5b8b9787a8f44803acfdffffff791ab42cec93dd9d5be2821d9830d84e35930bc81f44e529dd1ecda221ee5667ab381c405cde15fe305628398f2a7f12f740fb8ebb8c7849c57636aa94f8c3b89d8e7f915f8765290b5c23873d155523b4dcb3cf78f0bdf08194cc086738a700e42937f0fa083aef87145b84966b7e3636bf6dc1931961b98a8794afb2c4a5739a53ad270a792de1b67d386fbbc90030d546c82759940807dcb194e228d669bd", @ANYRESOCT]) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000740)={&(0x7f0000000040), 0xc, &(0x7f0000000700)={&(0x7f0000000f80)=ANY=[@ANYBLOB="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", @ANYRES16=r7, @ANYBLOB="10002cbd7000fcdbdf251500000044000908080002000000000008000100004ad0e100bae7f4ea490ebef0817800000008000200e55d0000080002009104000008000200a800000008000100f7ffffff08000200980e00000800020004000000fa49060008000100090000ffc2ac1490be9197db688dfbdc4ca526c241932f2c30fc10233b32ec2696651487e0045ef385e39b1ef31da0128e4838eef8fcc739684ce0b93a18bdaf5ebccbdf66b256a27731ff2e7c7c84a4e1957c04750f31ae24b671ce79d59f21960f9184aa8f23e2a06d9f4138b87300000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000894) sched_setparam(0x0, &(0x7f0000000500)=0xfffd) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0xffffffff, 0x8}, {0x8}], r8}, 0x18, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/enforce\x00', 0x8001, 0x0) r9 = creat(&(0x7f0000000000)='./bus\x00', 0x4) fcntl$setstatus(r9, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x800}}, 0x50) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f0000000180)='./bus\x00', 0x0) 00:49:43 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) [ 3435.732558] audit: type=1400 audit(1574988582.623:415186): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:44 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:44 executing program 0: socket$unix(0x1, 0x5, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) listen(0xffffffffffffffff, 0x4) wait4(0x0, &(0x7f00000000c0), 0x6000000a, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB], 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000023c0)={'sit0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8000001b, &(0x7f0000002400)={@local}, &(0x7f0000002440)=0xf) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002600)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', r3}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000029c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002a80)={'rose0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002b40)={@loopback}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000002bc0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, 0x0) accept4$packet(r1, 0x0, &(0x7f0000002e00), 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e40)={{{@in=@empty}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003100)=0xe8) r4 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0xa4bcd6ca7f9c8017) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000003280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000033c0)=0xe8) r5 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r5, 0x0, 0x62, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, 0x0) getpeername$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(r1, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003880)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000038c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@remote}, 0x0, @in6=@empty}}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000003c00)) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004240)={'team0\x00'}) r6 = open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f00000044c0)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000004500)={0x0, @empty}, &(0x7f0000004540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000004700)) sendmsg$TEAM_CMD_NOOP(r1, 0x0, 0xb1fd1f21d4b43693) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendto$inet(r2, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r7 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r7, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) write$binfmt_script(r8, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/996], 0xfffffffffffffd1a) setsockopt$sock_int(r2, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 3435.736633] audit: type=1400 audit(1574988582.633:415187): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3435.738372] audit: type=1400 audit(1574988582.633:415188): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:44 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000340)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)={@flat, @fd, @fda}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) [ 3435.740331] audit: type=1400 audit(1574988582.633:415189): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:44 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3435.742099] audit: type=1400 audit(1574988582.633:415190): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3438.094876] binder: 13310:13311 got transaction with fd, -1, but target does not allow fds [ 3438.094918] binder: 13310:13311 transaction failed 29201/-1, size 80-24 line 3241 [ 3438.096219] binder: undelivered TRANSACTION_ERROR: 29201 00:49:46 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:46 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 00:49:46 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000340)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)={@flat, @fd, @fda}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) 00:49:46 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:46 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syslog(0x3, &(0x7f0000000200)=""/147, 0x1e) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000380)=ANY=[], 0x0, 0x2) read(r0, &(0x7f0000000580)=""/250, 0xfffffffffffffe33) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = socket$inet6(0xa, 0x7, 0xfffffffffffffffe) setsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000100), 0xcb) fchdir(r2) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x103) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x60400, 0x0) truncate(&(0x7f00000002c0)='./bus\x00', 0x4a00) socket(0x11, 0x3, 0x8) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000380)={'nlmon0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCLINUX4(r6, 0x541c, &(0x7f0000000200)) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000400)={{0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x2}, 0x6}, {0xa, 0x4e23, 0x400000, @empty, 0x7}, 0xe8, [0x9, 0x0, 0x2, 0x4, 0x40, 0xffffffff, 0x9, 0x1f]}, 0x5c) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000140)=0x8) r7 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r8, &(0x7f00000001c0), 0x438c) syncfs(r7) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) [ 3439.783904] binder: 13328:13334 got transaction with fd, -1, but target does not allow fds [ 3439.809581] binder: 13328:13334 transaction failed 29201/-1, size 80-24 line 3241 00:49:46 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000340)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)={@flat, @fd, @fda}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) [ 3439.880803] binder: undelivered TRANSACTION_ERROR: 29201 00:49:46 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r2, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x100) recvmmsg(r2, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r3+30000000}) r4 = socket$inet(0x2, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) dup2(r5, r4) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r6, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000080)) r7 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r4, r7, 0x0, 0x80000003) 00:49:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3440.218881] binder: 13340:13343 got transaction with fd, -1, but target does not allow fds [ 3440.234956] binder: 13340:13343 transaction failed 29201/-1, size 80-24 line 3241 00:49:47 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000340)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)={@flat, @fd, @fda}, &(0x7f0000000180)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) [ 3440.297387] binder: undelivered TRANSACTION_ERROR: 29201 [ 3440.488889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=13353 comm=syz-executor.0 00:49:47 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) [ 3440.719700] audit_printk_skb: 1768 callbacks suppressed 00:49:47 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) syz_open_dev$binderN(0x0, 0x0, 0x0) [ 3440.719712] audit: type=1400 audit(1574988587.603:415781): avc: denied { dac_override } for pid=13346 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.737668] audit: type=1400 audit(1574988587.633:415782): avc: denied { net_raw } for pid=13327 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.743761] audit: type=1400 audit(1574988587.633:415783): avc: denied { dac_override } for pid=13330 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.767149] audit: type=1400 audit(1574988587.663:415784): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.771282] audit: type=1400 audit(1574988587.663:415785): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.773242] audit: type=1400 audit(1574988587.663:415786): avc: denied { call } for pid=13356 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 3440.774654] audit: type=1400 audit(1574988587.673:415787): avc: denied { transfer } for pid=13356 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 3440.774685] binder: 13356:13357 got transaction with fd, -1, but target does not allow fds [ 3440.774725] binder: 13356:13357 transaction failed 29201/-1, size 80-24 line 3241 [ 3440.788422] audit: type=1400 audit(1574988587.683:415788): avc: denied { sys_admin } for pid=13346 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.822074] binder: undelivered TRANSACTION_ERROR: 29201 00:49:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r7, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$TCSETXF(r7, 0x5434, &(0x7f0000000240)={0x3bfd, 0x0, [0x6, 0x1ff, 0x182, 0x0, 0x1db], 0x2}) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) flistxattr(r8, &(0x7f0000000340)=""/4096, 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) read(r4, &(0x7f0000000000)=""/250, 0xedf1d44) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 00:49:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:48 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000540)=""/4096) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:48 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:48 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000740)=@add_del={0x2, &(0x7f0000000780)='veth0_to_bridge\x00'}) fchdir(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x109100, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) lseek(r4, 0x20000010000, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={r1, 0x2, 0x1, 0x1, &(0x7f0000000500)=[0x0], 0x1}, 0x20) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) r6 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev, 0x200000000003}, 0x1c) sendmsg(r6, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000080)={0x0, r0}) getpeername$packet(r7, &(0x7f0000003a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a40)=0x8dbf078b9071ffa1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002980)={'irlan0\x00'}) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) 00:49:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000006000000000040000000000000000000ca000000000000009fe13b0c483de1cebc195b388f928fa255dfd2e10e8ffb079f86432247122c845e30baae4190406c482718bbe03c3b253c"]) [ 3440.833647] audit: type=1400 audit(1574988587.723:415789): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3440.835416] audit: type=1400 audit(1574988587.733:415790): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:48 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000006000000000040000000000000000000ca000000000000009fe13b0c483de1cebc195b388f928fa255dfd2e10e8ffb079f86432247122c845e30baae4190406c482718bbe03c3b253c"]) 00:49:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r7, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$TCSETXF(r7, 0x5434, &(0x7f0000000240)={0x3bfd, 0x0, [0x6, 0x1ff, 0x182, 0x0, 0x1db], 0x2}) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) flistxattr(r8, &(0x7f0000000340)=""/4096, 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) read(r4, &(0x7f0000000000)=""/250, 0xedf1d44) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 00:49:48 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r1, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:49 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:49 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:49 executing program 5: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r7, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$TCSETXF(r7, 0x5434, &(0x7f0000000240)={0x3bfd, 0x0, [0x6, 0x1ff, 0x182, 0x0, 0x1db], 0x2}) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c000000000000090000070000002005000000000000008d8a8d2458480000000000000000000035861c007bfe68a617059a70b3010000000400000057c4d99301f9646c"], 0x65) flistxattr(r8, &(0x7f0000000340)=""/4096, 0x1000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) read(r4, &(0x7f0000000000)=""/250, 0xedf1d44) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 00:49:50 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000740)=@add_del={0x2, &(0x7f0000000780)='veth0_to_bridge\x00'}) fchdir(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x109100, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) lseek(r4, 0x20000010000, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={r1, 0x2, 0x1, 0x1, &(0x7f0000000500)=[0x0], 0x1}, 0x20) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) r6 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r6, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev, 0x200000000003}, 0x1c) sendmsg(r6, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000080)={0x0, r0}) getpeername$packet(r7, &(0x7f0000003a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a40)=0x8dbf078b9071ffa1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002980)={'irlan0\x00'}) sendfile(r4, r5, 0x0, 0x8000fffffffe) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) 00:49:51 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:51 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000240)="e3275b49099af9c64fac067884fcc57af1611a5a5674e3a58d3cc09cf30f82cad822e57cb1eb0ef357a3221dc62252bc2cb2b2b96f92364b84cc4d65a893c83d0932108c9c6c912829f31faa3c5bda7d5abc17535a81dc728ab45a7533173a88f4aef48509a2f4eb6a0d7e96f7238efda94c4311db35279d806807cf9b5d66ecb28e48d437783aafe53080b0ed2a16f6a3c051ce640defbc2cc34e4b39ddb3dc0d70a3342317f44e943f7e6727997120619f6996ee0e4548fd4a2d96f788617c8cd2dedd5e", &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) 00:49:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:51 executing program 3: r0 = socket$inet(0x2, 0x2000000080002, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x1) 00:49:51 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 00:49:51 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:51 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:51 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 00:49:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:52 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 00:49:52 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:52 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/227, 0x797ffdd8ecdb4266}, 0x20) [ 3445.747930] audit_printk_skb: 2487 callbacks suppressed [ 3445.747943] audit: type=1400 audit(1574988592.643:416621): avc: denied { net_admin } for pid=13431 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:52 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x797ffdd8ecdb4266}, 0x20) [ 3445.781866] audit: type=1400 audit(1574988592.683:416622): avc: denied { sys_admin } for pid=13465 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.792501] audit: type=1400 audit(1574988592.683:416623): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:53 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3445.798908] audit: type=1400 audit(1574988592.693:416624): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.800745] audit: type=1400 audit(1574988592.693:416625): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.802662] audit: type=1400 audit(1574988592.693:416626): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.807561] audit: type=1400 audit(1574988592.703:416627): avc: denied { dac_override } for pid=13465 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.812228] audit: type=1400 audit(1574988592.703:416628): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:53 executing program 2: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) [ 3445.814355] audit: type=1400 audit(1574988592.703:416629): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3445.816176] audit: type=1400 audit(1574988592.713:416630): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) shutdown(r6, 0x1) 00:49:53 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:49:53 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:53 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:49:53 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 00:49:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) 00:49:54 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:55 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:55 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:55 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:55 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) 00:49:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) 00:49:55 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) 00:49:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 00:49:56 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:56 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) 00:49:56 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) 00:49:56 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:56 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) 00:49:56 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:57 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 00:49:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) 00:49:57 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:57 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:49:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) 00:49:57 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:57 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) [ 3450.760631] audit_printk_skb: 2656 callbacks suppressed [ 3450.760640] audit: type=1400 audit(1574988597.653:417518): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) [ 3450.771814] audit: type=1400 audit(1574988597.663:417519): avc: denied { dac_override } for pid=13562 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3450.785969] audit: type=1400 audit(1574988597.683:417520): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3450.787742] audit: type=1400 audit(1574988597.683:417521): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:57 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() [ 3450.789479] audit: type=1400 audit(1574988597.683:417522): avc: denied { dac_override } for pid=2067 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3450.791244] audit: type=1400 audit(1574988597.683:417523): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3450.802081] audit: type=1400 audit(1574988597.693:417524): avc: denied { net_admin } for pid=13559 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3450.809314] audit: type=1400 audit(1574988597.703:417525): avc: denied { net_admin } for pid=13559 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:49:58 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) [ 3450.826982] audit: type=1400 audit(1574988597.723:417526): avc: denied { read } for pid=13559 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:49:58 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:49:58 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) 00:49:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) [ 3450.832761] audit: type=1400 audit(1574988597.723:417527): avc: denied { read } for pid=13564 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:49:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x41, 0x0) 00:49:58 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:58 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 00:49:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) 00:49:58 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:49:58 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:49:59 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) 00:49:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) 00:50:01 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 00:50:01 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 00:50:01 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) 00:50:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_pts(r1, 0x101000) 00:50:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000080)={0xfffffffd, 0x7fff, 0x80000001}, 0x14) 00:50:01 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 00:50:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) 00:50:02 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:02 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) 00:50:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) 00:50:02 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) 00:50:02 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) [ 3455.764373] audit_printk_skb: 2271 callbacks suppressed 00:50:02 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 00:50:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) [ 3455.764380] audit: type=1400 audit(1574988602.663:418286): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:02 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) [ 3455.776691] audit: type=1400 audit(1574988602.673:418287): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) [ 3455.786201] audit: type=1400 audit(1574988602.683:418288): avc: denied { sys_admin } for pid=13656 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:03 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') [ 3455.788434] audit: type=1400 audit(1574988602.683:418289): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3455.792455] audit: type=1400 audit(1574988602.683:418290): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) 00:50:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) [ 3455.796526] audit: type=1400 audit(1574988602.693:418291): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3455.799607] audit: type=1400 audit(1574988602.693:418292): avc: denied { sys_admin } for pid=13656 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3455.801614] audit: type=1400 audit(1574988602.693:418293): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3455.803683] audit: type=1400 audit(1574988602.693:418294): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3455.805735] audit: type=1400 audit(1574988602.703:418295): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:05 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:05 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x4e21}, 0x10) 00:50:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) 00:50:05 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:05 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) 00:50:05 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) 00:50:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') 00:50:05 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 00:50:05 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:05 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:06 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 00:50:08 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) 00:50:08 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) 00:50:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:08 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:08 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3461.760653] audit_printk_skb: 2172 callbacks suppressed [ 3461.760660] audit: type=1400 audit(1574988608.653:419020): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:08 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) [ 3461.860776] audit: type=1400 audit(1574988608.753:419021): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3461.875198] audit: type=1400 audit(1574988608.773:419022): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:08 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) 00:50:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) [ 3461.876827] audit: type=1400 audit(1574988608.773:419023): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3461.881693] audit: type=1400 audit(1574988608.773:419024): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:09 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) [ 3461.898973] audit: type=1400 audit(1574988608.793:419025): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3461.909751] audit: type=1400 audit(1574988608.803:419026): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3461.911626] audit: type=1400 audit(1574988608.803:419027): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3461.913699] audit: type=1400 audit(1574988608.803:419028): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:09 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) [ 3461.930399] audit: type=1400 audit(1574988608.823:419029): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:09 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:09 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) getpgid(0x0) 00:50:09 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 00:50:09 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 00:50:10 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:10 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 00:50:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:10 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) 00:50:10 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:10 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:11 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:11 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) 00:50:12 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:12 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:12 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_pts(r1, 0x101000) 00:50:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_pts(r1, 0x101000) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) 00:50:12 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:12 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:12 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:12 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) socket$inet_tcp(0x2, 0x1, 0x0) 00:50:13 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:13 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:13 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:13 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3466.764401] audit_printk_skb: 3177 callbacks suppressed [ 3466.764410] audit: type=1400 audit(1574988613.653:420091): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.769448] audit: type=1400 audit(1574988613.663:420092): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:13 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3466.771723] audit: type=1400 audit(1574988613.653:420090): avc: denied { sys_admin } for pid=13881 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.775377] audit: type=1400 audit(1574988613.673:420093): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.777125] audit: type=1400 audit(1574988613.673:420094): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.778828] audit: type=1400 audit(1574988613.673:420095): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.780477] audit: type=1400 audit(1574988613.673:420096): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:14 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) [ 3466.782163] audit: type=1400 audit(1574988613.673:420097): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3466.783804] audit: type=1400 audit(1574988613.673:420098): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) [ 3466.785777] audit: type=1400 audit(1574988613.673:420099): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:14 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:14 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:14 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:14 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:14 executing program 0: syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:14 executing program 0: syz_open_dev$mice(0x0, 0x0, 0x900) 00:50:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) 00:50:15 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:15 executing program 0: syz_open_dev$mice(0x0, 0x0, 0x900) 00:50:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r4, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'bcsf0\x00', {0x2, 0x4e22, @rand_addr=0x1f}}) 00:50:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:15 executing program 0: syz_open_dev$mice(0x0, 0x0, 0x900) 00:50:15 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:15 executing program 0: syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) 00:50:15 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:16 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:16 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:16 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:16 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:16 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:17 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:17 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:17 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:17 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:19 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:19 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000801, 0x0) [ 3472.211193] audit_printk_skb: 3537 callbacks suppressed [ 3472.211202] audit: type=1400 audit(1574988619.103:421279): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.289634] audit: type=1400 audit(1574988619.183:421280): avc: denied { sys_admin } for pid=14005 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:19 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3472.297540] audit: type=1400 audit(1574988619.193:421281): avc: denied { dac_override } for pid=14005 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:19 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3472.309550] audit: type=1400 audit(1574988619.203:421282): avc: denied { sys_admin } for pid=14005 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.312233] audit: type=1400 audit(1574988619.203:421283): avc: denied { sys_admin } for pid=14005 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.315482] audit: type=1400 audit(1574988619.213:421284): avc: denied { sys_admin } for pid=14005 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8001) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) [ 3472.318343] audit: type=1400 audit(1574988619.213:421285): avc: denied { sys_admin } for pid=14003 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.337519] audit: type=1400 audit(1574988619.233:421286): avc: denied { dac_override } for pid=14003 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.365926] audit: type=1400 audit(1574988619.263:421287): avc: denied { sys_admin } for pid=14004 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3472.400782] audit: type=1400 audit(1574988619.293:421288): avc: denied { dac_override } for pid=14004 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:19 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:19 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:20 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:20 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:20 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:20 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:22 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) 00:50:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:22 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:22 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:22 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:22 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x900) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:22 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:23 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:23 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:23 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:23 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:25 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:25 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) 00:50:25 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:25 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:25 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3478.413205] audit_printk_skb: 2470 callbacks suppressed [ 3478.413213] audit: type=1400 audit(1574988625.303:422114): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:25 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3478.459403] audit: type=1400 audit(1574988625.353:422115): avc: denied { sys_admin } for pid=14099 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:25 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3478.465754] audit: type=1400 audit(1574988625.363:422116): avc: denied { dac_override } for pid=14099 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:25 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3478.509562] audit: type=1400 audit(1574988625.403:422117): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3478.509892] audit: type=1400 audit(1574988625.403:422118): avc: denied { sys_admin } for pid=14098 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:25 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3478.516548] audit: type=1400 audit(1574988625.403:422119): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3478.529022] audit: type=1400 audit(1574988625.423:422120): avc: denied { dac_override } for pid=14098 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3478.535611] audit: type=1400 audit(1574988625.433:422121): avc: denied { sys_admin } for pid=14098 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:25 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3478.540707] audit: type=1400 audit(1574988625.433:422122): avc: denied { sys_admin } for pid=14098 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3478.544272] audit: type=1400 audit(1574988625.433:422123): avc: denied { sys_admin } for pid=14098 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:26 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:26 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:26 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:26 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:26 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:26 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) 00:50:26 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:28 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:28 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() 00:50:28 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:50:28 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:28 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:29 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 00:50:29 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) 00:50:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:29 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:29 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 00:50:30 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3483.418350] audit_printk_skb: 3094 callbacks suppressed [ 3483.418359] audit: type=1400 audit(1574988630.313:423158): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 00:50:30 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:30 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:30 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3483.427872] audit: type=1400 audit(1574988630.323:423159): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.429688] audit: type=1400 audit(1574988630.323:423160): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.431276] audit: type=1400 audit(1574988630.323:423161): avc: denied { dac_override } for pid=25465 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) [ 3483.432915] audit: type=1400 audit(1574988630.323:423162): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.444691] audit: type=1400 audit(1574988630.343:423163): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.449541] audit: type=1400 audit(1574988630.343:423164): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:30 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3483.456254] audit: type=1400 audit(1574988630.353:423165): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.458523] audit: type=1400 audit(1574988630.353:423166): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3483.460220] audit: type=1400 audit(1574988630.353:423167): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:30 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) 00:50:32 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:32 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:32 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:32 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:32 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 00:50:33 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:33 executing program 4: read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:33 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:33 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:33 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:33 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:33 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:33 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:33 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:34 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:34 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:34 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:34 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:34 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:34 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:34 executing program 3: read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:34 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:34 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:34 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:35 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:35 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3488.428274] audit_printk_skb: 2988 callbacks suppressed [ 3488.428283] audit: type=1400 audit(1574988635.323:424164): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.428307] audit: type=1400 audit(1574988635.323:424165): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.441016] audit: type=1400 audit(1574988635.323:424166): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.445271] audit: type=1400 audit(1574988635.333:424167): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.453012] audit: type=1400 audit(1574988635.333:424168): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.456964] audit: type=1400 audit(1574988635.333:424169): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.464418] audit: type=1400 audit(1574988635.363:424170): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.468131] audit: type=1400 audit(1574988635.363:424171): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.475922] audit: type=1400 audit(1574988635.363:424172): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3488.484556] audit: type=1400 audit(1574988635.363:424173): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:37 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:37 executing program 0: syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') 00:50:37 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:37 executing program 0: syz_open_procfs(0x0, 0x0) 00:50:37 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:37 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:37 executing program 0: syz_open_procfs(0x0, 0x0) 00:50:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:38 executing program 0: syz_open_procfs(0x0, 0x0) 00:50:38 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:38 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:38 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:39 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:41 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:41 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:41 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(0x0, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3494.785123] audit_printk_skb: 2518 callbacks suppressed [ 3494.785131] audit: type=1400 audit(1574988641.683:425014): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.838015] audit: type=1400 audit(1574988641.733:425015): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.848588] audit: type=1400 audit(1574988641.733:425016): avc: denied { sys_admin } for pid=14381 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.876442] audit: type=1400 audit(1574988641.763:425017): avc: denied { sys_admin } for pid=14382 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:41 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3494.942365] audit: type=1400 audit(1574988641.833:425018): avc: denied { net_admin } for pid=14380 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.959455] audit: type=1400 audit(1574988641.833:425019): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.961102] audit: type=1400 audit(1574988641.833:425020): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.967257] audit: type=1400 audit(1574988641.833:425021): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) dup(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:42 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3494.972378] audit: type=1400 audit(1574988641.873:425022): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3494.983018] audit: type=1400 audit(1574988641.873:425023): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:42 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:42 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:42 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:42 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:42 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:42 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100), &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:43 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) ioctl$TCSETA(r0, 0x5406, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:43 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:45 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:45 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xffdbc4c3) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:45 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 5: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:45 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:46 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:46 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:46 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:46 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:46 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3499.794354] audit_printk_skb: 2288 callbacks suppressed [ 3499.794362] audit: type=1400 audit(1574988646.693:425787): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3499.817197] audit: type=1400 audit(1574988646.713:425788): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3499.822689] audit: type=1400 audit(1574988646.713:425789): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3499.826622] audit: type=1400 audit(1574988646.723:425790): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:47 executing program 0: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3499.832252] audit: type=1400 audit(1574988646.723:425791): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) [ 3499.833897] audit: type=1400 audit(1574988646.723:425792): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3499.843136] audit: type=1400 audit(1574988646.733:425793): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:47 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3499.845011] audit: type=1400 audit(1574988646.743:425794): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:47 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3499.847070] audit: type=1400 audit(1574988646.743:425795): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3499.848940] audit: type=1400 audit(1574988646.743:425796): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:47 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:47 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:48 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:49 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:49 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:49 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:49 executing program 5: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, 0x0) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:49 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x1850c6, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) creat(&(0x7f0000000400)='./file0\x00', 0x0) 00:50:49 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:49 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:49 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/173, 0xad}], 0x1) 00:50:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:50 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r3, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x4, 0x0) 00:50:50 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:50 executing program 4: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:50 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r2, r0, 0x0) 00:50:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:50 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x3c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:50:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/210, 0xd2}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/116, 0x74}, {0x0}], 0x2}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000001600)=[{&(0x7f0000000000)=""/91, 0x5b}, {0x0}, {0x0}], 0x3) shutdown(r4, 0x0) shutdown(r2, 0x0) 00:50:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000000740)=[{&(0x7f00000007c0)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x4eee, 0x0, 0x0, 0x800e00551) shutdown(r2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/104, 0x68}], 0x1}, 0x6) shutdown(r3, 0x0) 00:50:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:51 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r1, &(0x7f0000004000)=[{&(0x7f0000003ec0)=""/91, 0x5b}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000000740)=[{&(0x7f00000007c0)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}], 0x4) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x4eee, 0x0, 0x0, 0x800e00551) shutdown(r4, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/104, 0x68}], 0x1}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 00:50:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) [ 3504.822199] audit_printk_skb: 2603 callbacks suppressed [ 3504.822211] audit: type=1400 audit(1574988651.713:426665): avc: denied { net_admin } for pid=14610 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3504.861398] audit: type=1400 audit(1574988651.753:426666): avc: denied { net_admin } for pid=14610 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:51 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 3504.933248] audit: type=1400 audit(1574988651.823:426667): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3504.967145] audit: type=1400 audit(1574988651.863:426668): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3504.970206] audit: type=1400 audit(1574988651.863:426669): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3504.976584] audit: type=1400 audit(1574988651.873:426670): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3504.993578] audit: type=1400 audit(1574988651.883:426671): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3505.008648] audit: type=1400 audit(1574988651.903:426672): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3505.037017] audit: type=1400 audit(1574988651.933:426673): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000009c0)=[{&(0x7f0000000280)=""/210, 0xd2}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/116, 0x74}, {0x0}], 0x2}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f0000001600)=[{&(0x7f0000000000)=""/91, 0x5b}, {0x0}, {0x0}], 0x3) shutdown(r4, 0x0) shutdown(r2, 0x0) [ 3505.042535] audit: type=1400 audit(1574988651.933:426674): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:52 executing program 4: poll(&(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x46) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) r1 = dup(r0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000140)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r1, 0x0) 00:50:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/194, 0xc2}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/1, 0xfd7c}, {0x0, 0x2ec}], 0x1ba}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x100000211, 0x0, 0x0, 0x800e00706) shutdown(r4, 0x0) shutdown(r1, 0x0) 00:50:52 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) 00:50:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:52 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:54 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:54 executing program 4: poll(&(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0x46) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) r1 = dup(r0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000140)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r1, 0x0) 00:50:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:54 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:54 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000005b00)="1213772e65e4075827a85fddef692ef3", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @empty}}}, {{@in6=@local}, 0x0, @in=@initdev}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:50:54 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) syz_emit_ethernet(0xc1, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x40000000, 0x689}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x8dffffff00000000, 0xfe03, 0x0, 0xfffffff5, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x5, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @ipv4={[], [], @remote}}}}}}}}, 0x0) 00:50:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f00000000c0)=0x2a, 0x4) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000140)=0xfffffffe, 0x4) 00:50:54 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:50:54 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x101, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 00:50:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000640)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r1, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$sock_int(r1, 0x1, 0xc, &(0x7f0000000140)=0xfffffffe, 0x4) 00:50:54 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:50:57 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 00:50:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x7a, &(0x7f0000000380)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "82ab9c", 0x44, 0x2c, 0x0, @remote, @empty, {[], @gre}}}}}, 0x0) 00:50:57 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:50:57 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:57 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) [ 3510.496094] audit_printk_skb: 1710 callbacks suppressed [ 3510.496103] audit: type=1400 audit(1574988657.393:427245): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:57 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@random="57b8c6f52385", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3510.601821] audit: type=1400 audit(1574988657.493:427246): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 3510.635488] audit: type=1400 audit(1574988657.533:427247): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:57 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:50:57 executing program 3: mount(&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, &(0x7f0000000440)='debugfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000080)='system_u:object_r:dbusd_exec_t:s0\x00', 0x22, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) getpid() ptrace$getregset(0x4205, 0x0, 0x202, &(0x7f0000000280)={&(0x7f0000004540)=""/4096, 0x1000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, "3431b6d4ebd9bc5b066a598cde04f8b1e907978bca1791ce5968d3b808ca5a9155449afffc970f33225eab59e77a9704a28df3f9350010700fbe1ed4da7db4b6", "2cfc9bb499003bd59175414ae825b9c1fca58f25b9ee26ca667d352769e74a162aec16fd5de2d46bc628d7ffce790d8fd9f58c1d91ade68f9c819fdaf77e2e9b", "5000a9e3224f461bb4d8d8c5844bf6983eaea59f03be2402a206c2b95e5b3bc7"}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) [ 3510.639675] audit: type=1400 audit(1574988657.533:427248): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3510.660475] audit: type=1400 audit(1574988657.553:427249): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:57 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000032f0000000000000000000000000000375817cb0000000040000000000000ffffffffffffffdd0000000000000038000000000000000000"], 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') read(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r5, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000780)=""/114) sendmsg$nl_generic(r5, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28040010}, 0x2000c011) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000180)=""/188) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x402c2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000040)}) pwritev(r5, &(0x7f0000000640)=[{&(0x7f00000005c0)="2c60c9468d1117b66a65d0138d20dc08f5a921199edd749f1ecd0dd6c4cc83d7ea7ca04007b3eab4b4ad6d382c8215521ad03b5dd3dad7a7268db5dc80e93d70b9748d4d814bd52666763b368e0b80c54230158787cfcbf8f5e3", 0x5a}], 0x1, 0x800) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0xc6, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4000, 0x0) [ 3510.662596] audit: type=1400 audit(1574988657.553:427250): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:57 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) [ 3510.667817] audit: type=1400 audit(1574988657.563:427251): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3510.681021] audit: type=1400 audit(1574988657.573:427252): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3510.682689] audit: type=1400 audit(1574988657.573:427253): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3510.688703] audit: type=1400 audit(1574988657.583:427254): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:50:58 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:58 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000032f0000000000000000000000000000375817cb0000000040000000000000ffffffffffffffdd0000000000000038000000000000000000"], 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') read(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r5, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000780)=""/114) sendmsg$nl_generic(r5, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28040010}, 0x2000c011) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000180)=""/188) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x402c2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000040)}) pwritev(r5, &(0x7f0000000640)=[{&(0x7f00000005c0)="2c60c9468d1117b66a65d0138d20dc08f5a921199edd749f1ecd0dd6c4cc83d7ea7ca04007b3eab4b4ad6d382c8215521ad03b5dd3dad7a7268db5dc80e93d70b9748d4d814bd52666763b368e0b80c54230158787cfcbf8f5e3", 0x5a}], 0x1, 0x800) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0xc6, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4000, 0x0) 00:50:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 00:50:58 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:50:58 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:50:58 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000032f0000000000000000000000000000375817cb0000000040000000000000ffffffffffffffdd0000000000000038000000000000000000"], 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') read(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r5, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000780)=""/114) sendmsg$nl_generic(r5, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28040010}, 0x2000c011) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000180)=""/188) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x402c2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000040)}) pwritev(r5, &(0x7f0000000640)=[{&(0x7f00000005c0)="2c60c9468d1117b66a65d0138d20dc08f5a921199edd749f1ecd0dd6c4cc83d7ea7ca04007b3eab4b4ad6d382c8215521ad03b5dd3dad7a7268db5dc80e93d70b9748d4d814bd52666763b368e0b80c54230158787cfcbf8f5e3", 0x5a}], 0x1, 0x800) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0xc6, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4000, 0x0) 00:50:59 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3514.910457] IPv6: ADDRCONF(NETDEV_UP): tun5: link is not ready [ 3514.916535] IPv6: ADDRCONF(NETDEV_UP): tun6: link is not ready [ 3514.922540] IPv6: ADDRCONF(NETDEV_UP): tun7: link is not ready [ 3514.928609] IPv6: ADDRCONF(NETDEV_UP): tun8: link is not ready [ 3514.934730] IPv6: ADDRCONF(NETDEV_UP): tun9: link is not ready [ 3516.986681] audit_printk_skb: 1401 callbacks suppressed [ 3516.986688] audit: type=1400 audit(1574988663.883:427722): avc: denied { net_admin } for pid=14703 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.017724] audit: type=1400 audit(1574988663.913:427723): avc: denied { net_admin } for pid=14703 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.065139] IPv6: ADDRCONF(NETDEV_UP): tun5: link is not ready [ 3517.071177] IPv6: ADDRCONF(NETDEV_UP): tun6: link is not ready [ 3517.077249] IPv6: ADDRCONF(NETDEV_UP): tun7: link is not ready 00:51:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/216, 0xd8}, {0x0}, {0x0}], 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r4, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) recvfrom$inet(r4, 0x0, 0xd09a, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) shutdown(r4, 0x0) 00:51:04 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) [ 3517.083278] IPv6: ADDRCONF(NETDEV_UP): tun8: link is not ready [ 3517.090029] IPv6: ADDRCONF(NETDEV_UP): tun9: link is not ready [ 3517.099011] audit: type=1400 audit(1574988663.993:427724): avc: denied { net_admin } for pid=14724 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:04 executing program 0: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000032f0000000000000000000000000000375817cb0000000040000000000000ffffffffffffffdd0000000000000038000000000000000000"], 0x40) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='auxv\x00') read(r3, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r5, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000780)=""/114) sendmsg$nl_generic(r5, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28040010}, 0x2000c011) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000180)=""/188) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x402c2, 0x0) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000580)={0x34, 0x0, &(0x7f0000000040)}) pwritev(r5, &(0x7f0000000640)=[{&(0x7f00000005c0)="2c60c9468d1117b66a65d0138d20dc08f5a921199edd749f1ecd0dd6c4cc83d7ea7ca04007b3eab4b4ad6d382c8215521ad03b5dd3dad7a7268db5dc80e93d70b9748d4d814bd52666763b368e0b80c54230158787cfcbf8f5e3", 0x5a}], 0x1, 0x800) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast2}, 0xc6, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x4000, 0x0) [ 3517.104217] audit: type=1400 audit(1574988663.993:427725): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.105863] audit: type=1400 audit(1574988663.993:427726): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.110799] audit: type=1400 audit(1574988663.993:427727): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.115702] audit: type=1400 audit(1574988663.993:427728): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.123873] audit: type=1400 audit(1574988663.993:427729): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3517.128553] audit: type=1400 audit(1574988664.023:427730): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:04 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c8252", @ANYRES32], 0x0, 0x14}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:51:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 00:51:04 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r4, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r4, 0x0, 0xd09a, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) shutdown(r4, 0x0) 00:51:04 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) [ 3517.146335] audit: type=1400 audit(1574988664.033:427731): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:04 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 00:51:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:04 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 00:51:05 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:05 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 00:51:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c8252", @ANYRES32], 0x0, 0x14}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:51:07 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:07 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:07 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 00:51:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c8252", @ANYRES32], 0x0, 0x14}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:51:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="eabe9f303b222957eecbce24877c8252", @ANYRES32], 0x0, 0x14}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:51:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:08 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 00:51:08 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:11 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:11 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:11 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 00:51:11 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) mkdir(&(0x7f0000000100)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x400003fff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000140)='./control/file0\x00', 0x0) [ 3524.248299] audit_printk_skb: 2466 callbacks suppressed [ 3524.248307] audit: type=1400 audit(1574988671.143:428555): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3524.287822] audit: type=1400 audit(1574988671.183:428556): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) [ 3524.289088] audit: type=1400 audit(1574988671.183:428557): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:11 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:11 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) [ 3524.308578] audit: type=1400 audit(1574988671.203:428558): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3524.327981] audit: type=1400 audit(1574988671.223:428559): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3524.345086] audit: type=1400 audit(1574988671.243:428560): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:11 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000480)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 3524.346728] audit: type=1400 audit(1574988671.243:428561): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) [ 3524.349602] audit: type=1400 audit(1574988671.243:428562): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3524.373266] audit: type=1400 audit(1574988671.263:428563): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3524.376084] audit: type=1400 audit(1574988671.273:428564): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:11 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) 00:51:11 executing program 5: dup(0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/7, 0x7}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) poll(0x0, 0x0, 0x800000000004b) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) 00:51:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:11 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:11 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:12 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:12 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x77, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f5297240df794a3f9e8efd1c159b2bb4cfdc71f2cd4ccab9501004", 0x2c}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001f80)="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", 0x276}], 0x1}}], 0x2, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 00:51:15 executing program 4: open(0x0, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 00:51:15 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:15 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(r3, 0x400454dc, 0x0) 00:51:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:15 executing program 3: ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:15 executing program 4: open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:15 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:15 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(r3, 0x400454dc, 0x0) 00:51:15 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:15 executing program 0: r0 = creat(0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:15 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x40}}, 0x0) 00:51:16 executing program 0: r0 = creat(0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3529.269099] audit_printk_skb: 2673 callbacks suppressed [ 3529.269107] audit: type=1400 audit(1574988676.143:429456): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) [ 3529.290503] audit: type=1400 audit(1574988676.183:429457): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfffffffffffffe2d) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(0x0, 0x0) write$P9_RREMOVE(r1, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8020001) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000002180), 0x3c3) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execve(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 00:51:16 executing program 0: r0 = creat(0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3529.292277] audit: type=1400 audit(1574988676.183:429458): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:16 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) [ 3529.331411] audit: type=1400 audit(1574988676.233:429460): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3529.334737] audit: type=1400 audit(1574988676.203:429459): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:16 executing program 5: 00:51:16 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3529.336655] audit: type=1400 audit(1574988676.233:429461): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:16 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3529.338651] audit: type=1400 audit(1574988676.233:429462): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3529.340550] audit: type=1400 audit(1574988676.233:429463): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3529.342437] audit: type=1400 audit(1574988676.233:429464): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3529.347992] audit: type=1400 audit(1574988676.243:429465): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:19 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 00:51:19 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:19 executing program 5: 00:51:19 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:19 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:19 executing program 5: 00:51:19 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:19 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:19 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) 00:51:19 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:22 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:22 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:22 executing program 5: 00:51:22 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:22 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x2c}}, 0x0) [ 3535.404619] audit_printk_skb: 1862 callbacks suppressed [ 3535.404626] audit: type=1400 audit(1574988682.303:430087): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:22 executing program 5: 00:51:22 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3535.477458] audit: type=1400 audit(1574988682.373:430088): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 3535.506840] audit: type=1400 audit(1574988682.403:430089): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x40}}, 0x0) 00:51:22 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) [ 3535.508366] audit: type=1400 audit(1574988682.403:430090): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:22 executing program 5: [ 3535.518007] audit: type=1400 audit(1574988682.413:430091): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3535.522950] audit: type=1400 audit(1574988682.413:430092): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3535.524313] audit: type=1400 audit(1574988682.413:430093): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3535.527645] audit: type=1400 audit(1574988682.423:430094): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3535.528202] audit: type=1400 audit(1574988682.423:430095): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3535.533214] audit: type=1400 audit(1574988682.423:430096): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:23 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:23 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000001000000000000030300000005000000030000000700800000000544620c17031f8b248305fe9be243801fa8f796bd6d893250c51ad3a7ce91b301a5663ebddff81e0b0f4779e1c02c468651e58bc086c0b1aca3b2dd69638465bf0ccd47084fc657855210c749be1bd4d3da7a6fbabf56c5912f048b2543c8ed7f08694d03b49521ec81b0fcd8e46d3dadd18b976ee992a933734aa049d73e461af2d1faa5222272b44f2c48e74f1a40c0d004c9a04d61197141ccc614416d293da9"], &(0x7f0000000240)=""/178, 0x32, 0xb2, 0x8}, 0x20) 00:51:23 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:23 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x40}}, 0x0) 00:51:23 executing program 5: creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'pids'}, {0x2d, 'pids'}, {0x2b, 'memory'}, {0x2b, 'cpu'}]}, 0x19) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_emit_ethernet(0x0, &(0x7f00000007c0)=ANY=[], 0x0) r1 = getpid() tkill(r1, 0x9) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 00:51:23 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:23 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:51:23 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14}]}, 0x40}}, 0x0) 00:51:23 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xc}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 00:51:23 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000340)='./file0\x00', 0x4) 00:51:24 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:51:24 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x2c}}, 0x0) 00:51:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2080, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffff71, 0x200047fd, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x2c7) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYPTR64=&(0x7f0000001380)=ANY=[@ANYRES16, @ANYRES64=r5], @ANYRESDEC, @ANYRESDEC=r3, @ANYRESDEC=r0, @ANYRES64], 0x4c) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x10000000013, 0x0, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) r7 = socket(0x200000000000011, 0x4000000000080002, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r7, &(0x7f0000000000)={0x11, 0x0, r9}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@ipv4={[], [], @empty}, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000017c0)=0xe8) socket(0x200000000000011, 0x4000000000080002, 0x0) r10 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r11 = memfd_create(&(0x7f0000000740)='\x00\x9aF\aM\xe0~\x1e5\t\xe7@\xe7\x1a\xb3#\x84\xd0g^\xb0\xe0L\xcd\x84/\xbcho\xdeq\xe4\xf5\x85\x18R\xef\xc8\x8bg\x7f~r\xc5\xde\r\x86\\g\xef-\x02\xa4\x94\xd6=+1\xbb\x8a\xde\xec\xfa&\xd6\"\xa9\x8c\xbctJ\v)!\x9c\x98\xa5\x9b\x8f\n\"\xa2h\xf44\xa3K<\xa9\x02\x87\xb6\xef\xcd\xe7\x12\xcf|5\xd3\xd4\r\xd6#1\xa7\xf7\x1a\x00\xb4\x16;\xa2\xab\xc6\xc1\xbd&\xc9\xf7u\xac\x0e\xfdP\xa2\x91\x86\xf9\xc8S/\x94\x93\xd2\fI\x1e\xa4>\xa3\x18\xddc\x95\x9an\nE\xedV\x06\x9cK\x0fO\xf8dV\xee\b\x80\xe8\xcf\x8f\'8\xb0\x03\x99s\xa0f\xb2\xeflgI\xe2\xad\xc0\x90\xff\a\xd75\x18\xdc\x9dva\xa1\xfc\xb9\xfe\xf2\xfcB\xfe\xb7\x06\x0eN\x13\xce\xfaQ\xf1\x9b\x15\xd0/sx\x97K2hz\x92~\xdd5$\x02\x12\xd5\xa6I>k\xa4\xb7\xaa\x95\a\x1f\x1f\xafd\xfd\xc2X>\bp&\xa6`3\"\x1fa\xdd*\x92d-C\x9cwJ\xbcE\xe8\xdf\x15\x01\x9b\xa1^f\xfb6\b\xd3\f.4\xa5\x17\x89\n\xb5\xb4\x7f\x97\xebnJB?\xdb\x9d\xe90k\xa9\xe7_[S\x9e\xbf\xf5~\xc6\xf6\xc8G+N\x1f\x1a\xb9<\xcaB^\xd2\x97\xf8\x0ej>p99-\x04\x9e(\x9b\xf3@yJj=\xde\xce\xa2', 0x2) pwritev(r11, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) sendfile(r10, 0xffffffffffffffff, 0x0, 0x24000000) 00:51:24 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:26 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:51:26 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x2c}}, 0x0) 00:51:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x25b2, 0x1}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) fallocate(r2, 0x4000000000000010, 0x0, 0x7fff) 00:51:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:26 executing program 5: 00:51:26 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:51:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x4}}]}, 0x2c}}, 0x0) 00:51:26 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:26 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:26 executing program 5: 00:51:27 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:27 executing program 5: 00:51:27 executing program 5: 00:51:27 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:27 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) [ 3540.416347] audit_printk_skb: 3384 callbacks suppressed [ 3540.416354] audit: type=1400 audit(1574988687.313:431225): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.421470] audit: type=1400 audit(1574988687.313:431226): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.424453] audit: type=1400 audit(1574988687.323:431227): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:27 executing program 2: 00:51:27 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) [ 3540.427623] audit: type=1400 audit(1574988687.323:431228): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:27 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3540.433160] audit: type=1400 audit(1574988687.323:431229): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.436309] audit: type=1400 audit(1574988687.333:431230): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:27 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 3540.441206] audit: type=1400 audit(1574988687.333:431231): avc: denied { sys_admin } for pid=2072 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.460651] audit: type=1400 audit(1574988687.353:431233): avc: denied { net_admin } for pid=2072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.462911] audit: type=1400 audit(1574988687.343:431232): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3540.467425] audit: type=1400 audit(1574988687.363:431234): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:27 executing program 5: 00:51:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:51:27 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:27 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:28 executing program 5: 00:51:28 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:28 executing program 2: 00:51:28 executing program 5: 00:51:28 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:28 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, 0x0) 00:51:28 executing program 5: 00:51:28 executing program 5: 00:51:28 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, 0x0) 00:51:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 00:51:28 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:28 executing program 2: 00:51:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) poll(0x0, 0x0, 0x0) dup(r1) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) shutdown(r0, 0x0) 00:51:29 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:29 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, 0x0) 00:51:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffdb1, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f0000000840)=[{&(0x7f0000000100)=""/111, 0x6f}], 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)=""/129, 0x81}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 00:51:29 executing program 2: poll(0x0, 0x0, 0x42) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) shutdown(r0, 0x0) 00:51:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:29 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, &(0x7f0000000540)) 00:51:29 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, &(0x7f0000000540)) 00:51:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r4, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000080)={0x0, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r4, 0x0, 0xd09a, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) shutdown(r4, 0x0) 00:51:31 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/216, 0xd8}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r4, 0xffff, 0x1006, &(0x7f0000000000)={0x5}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, 0x0, 0x0) recvfrom$inet(r4, 0x0, 0xd09a, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) shutdown(r4, 0x0) 00:51:31 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f00000005c0)=""/223, 0xfc61) 00:51:31 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x0, &(0x7f0000000540)) 00:51:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:51:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/118, 0x76}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/245, 0xf5}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) 00:51:31 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 00:51:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 00:51:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 00:51:32 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:32 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) [ 3545.427664] audit_printk_skb: 3007 callbacks suppressed [ 3545.427673] audit: type=1400 audit(1574988692.323:432238): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:32 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000000)='sockfs\x00', 0x0, 0x0) [ 3545.438068] audit: type=1400 audit(1574988692.323:432239): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:32 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3545.452045] audit: type=1400 audit(1574988692.323:432240): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3545.459870] audit: type=1400 audit(1574988692.363:432241): avc: denied { sys_admin } for pid=15263 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3545.475602] audit: type=1400 audit(1574988692.363:432242): avc: denied { dac_override } for pid=15263 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3545.479318] audit: type=1400 audit(1574988692.373:432243): avc: denied { net_admin } for pid=2068 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3545.492280] audit: type=1400 audit(1574988692.373:432244): avc: denied { sys_admin } for pid=15263 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) [ 3545.499977] audit: type=1400 audit(1574988692.373:432246): avc: denied { sys_admin } for pid=15263 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:32 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 3545.503521] audit: type=1400 audit(1574988692.373:432248): avc: denied { sys_admin } for pid=15263 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3545.508130] audit: type=1400 audit(1574988692.373:432245): avc: denied { sys_admin } for pid=2071 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:32 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:32 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 00:51:32 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) 00:51:33 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3546.130328] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:51:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000020000ce19, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:51:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:51:33 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x20, 0x10, 0x705}, 0x20}}, 0x0) 00:51:33 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'bridge_slave_0\x00', @ifru_map={0xca}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000000c0), 0x48000) 00:51:33 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:33 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:33 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 00:51:33 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffff9, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000020000ce19, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:51:33 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x10000}]) 00:51:34 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 00:51:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="240000001a005f0214f9f407000904001100000000000000000000000800040003000000", 0x24) 00:51:34 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:34 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f0000000900)=""/4096, &(0x7f0000000700)=0x1000) 00:51:34 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@empty, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, @icmp=@info_reply}}}}, 0x0) 00:51:34 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 00:51:34 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@rand_addr="8af80dba3cb1dd34f6a620535f19bf8a"}, 0x14) 00:51:36 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:36 executing program 3: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xb5) 00:51:36 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 00:51:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 00:51:36 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x200000000004e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 00:51:36 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x231, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:51:36 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x231, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:51:37 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 00:51:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x231}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x8, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0xac, &(0x7f0000000280)=""/172, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x2}, 0x10}, 0x70) close(r1) 00:51:37 executing program 4: socketpair(0x8, 0x0, 0x0, &(0x7f0000000240)) 00:51:37 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x2, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x48}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:51:37 executing program 5: 00:51:37 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, 0x0, 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:37 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 00:51:37 executing program 5: [ 3550.435212] audit_printk_skb: 3027 callbacks suppressed [ 3550.435220] audit: type=1400 audit(1574988697.333:433257): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:37 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, 0x0, 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:37 executing program 5: 00:51:37 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 3550.465895] audit: type=1400 audit(1574988697.363:433258): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:37 executing program 3: 00:51:37 executing program 5: 00:51:37 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, 0x0, 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) [ 3550.467866] audit: type=1400 audit(1574988697.363:433259): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:37 executing program 4: [ 3550.469972] audit: type=1400 audit(1574988697.363:433260): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.471817] audit: type=1400 audit(1574988697.363:433261): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.473569] audit: type=1400 audit(1574988697.363:433262): avc: denied { net_admin } for pid=2069 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.486615] audit: type=1400 audit(1574988697.383:433263): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.489077] audit: type=1400 audit(1574988697.383:433264): avc: denied { dac_override } for pid=15390 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.491796] audit: type=1400 audit(1574988697.383:433265): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3550.502775] audit: type=1400 audit(1574988697.393:433267): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:38 executing program 2: 00:51:38 executing program 5: 00:51:38 executing program 3: 00:51:38 executing program 0: 00:51:38 executing program 4: 00:51:38 executing program 5: 00:51:38 executing program 0: 00:51:38 executing program 4: 00:51:38 executing program 3: 00:51:38 executing program 0: 00:51:41 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:41 executing program 4: 00:51:41 executing program 2: 00:51:41 executing program 5: 00:51:41 executing program 0: 00:51:41 executing program 3: 00:51:41 executing program 5: 00:51:41 executing program 0: 00:51:41 executing program 4: 00:51:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/65, 0x1d5112251299fe84}], 0x1000000000000009) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000140)=[{r2}], 0x1, &(0x7f0000000180)={0x745}, 0x0, 0x0) shutdown(r1, 0x0) 00:51:41 executing program 2: poll(0x0, 0x0, 0x42) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) read(r0, 0x0, 0x247) shutdown(r0, 0x0) 00:51:41 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:41 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:41 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e21, @remote}, 0x204, 0x0, 0x0, 0x0, 0xfffe, &(0x7f0000000000)='veth0_to_hsr\x00', 0x7ffffffe, 0x1, 0x89e8}) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02020000020000000000000000001900e5903eb47a8642a1ed40b53aceef9b06f36c30f4bbb019f9b348c2e9521741019d9e8d0aaa8e8aad9ddc4860d74b47d690b72e1b9b0969e6ef8b30492c5fa87a3d701df2dd39bca627308c1471f1d36e1005aa00f8369965e9356ee5cb05ddd3"], 0x10}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400024c, 0x0) 00:51:41 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:41 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:41 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4b, 0x0, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xb80, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="ac021c0158eab1caa6e4f4989e3495ca"}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x88001) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x800000004e22}, 0x1c) listen(r3, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xfe40) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) fchmod(r4, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0xffffffffffffff7a) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r6 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:51:42 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x2, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfe}}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x5) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0xb309a17e871cc587}, 0x14}}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000380)=@md5={0x1, "86ee741e65596c5d12183d4e4a409aa4"}, 0x11, 0x2) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000340)) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000300)) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000001f80)={0x0, 0xfb, 0x1015, 0x1, 0x9, "d4e7376f3b4d76fbda37026a3937feb4", "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"}, 0x1015, 0x1) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f52972", 0x14}, {&(0x7f0000001c40)}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b5", 0x40}, {0x0}, {0x0}, {&(0x7f0000000f40)="54a0e828872fe6e9bda086485e7f3bde08422042e5a05f13bea1486085300093f4a5a4abda46a4397be6331a2788d84995d0682db2ecba4cc024be1f493430feba24e7ef0e3987eb5ab799e035467f84ea4affb56e6ec3c3ec6bedb3a146f7d5ac1dd0fbbe738f75eec6fcfb55946d08623418c6a554fa5ae4bab3e352df47136233937c1c3ddd6c5bee1826a294c32a78eca238409a18e551720236a1187feb5975a28f5bbb83c8ad97f63537144bdffef8a43b62aa89d46cfed06318678870256e07a42a6f989ca29cce7992fdbbecb9407eceea5cd8b6daac884fc609af653c90b36f4ff03477eaebeeb62ade20c9c0a65cee56e82e9168cbebc2fbddf931caaa483bc10127aa87b13e88929aaba33011d800a0771d8d90cd838a4f34cd7faa044f9713f5d3e2d7be15ec44f4196799fe8f6705af7e23a81e33f5d3dd1236ecbec240ef8ebfe4df5bd1783f8730828da1357f7e1a66bb475d76bacbeb41818e016de90130f5796cf7ffa4cc28fca35fa3db8a271c150ee10c296bee997fdf46b06372b7f1b2a7d8159baaee675a02e5b4185fb68c337a3ccf92ebb8b836f6a70342c533229f978ba5f3ebb9460df23739be87b9aa01bd1a804f40d744d0cc060b44a520a4a1dd3e95c86150a9fb914d34bc6b61d91f344aacee3c94c1040e867d5cd4d37687bf685a27216307431b31f486b22da39374da24ad1cd61b98855c1eb493245ba97333227c45cb4e5743e119423a42cf73721e1ca0e5cade1f4c0f1c7d098ce5baa5adcd1d73eee5f7498617c5bd00181f3364d7f1a0f54f5633aa8e7ec42244f023b2d5a311933e9a52f68e8c3e46caa6d9611ca5d3216caf842275c9bcaf6503245ccda6d53907ca4ac3af4452896044b41ab55884d5cdbcf048044eb5d1cc5691f5142751f3c7e214afaede155e713e72cb9634e4de1f661527cca426983d788e31d6b0c831383d2140a7b9b134f6e68b0378589532b11bba1008347dfb481ff083177ca4d4454c32011fd1e9fa1bfe8698f1791a4097bc5ec4e0b1d8a93f457a2263d391d158eb7dfa29b59c6fec5cd9316a91c839e2f39d91d384e16eb06c400bd05ae53022fa967e0059163eae2f1572048694ac53be7db2e9", 0x322}], 0x4}}], 0x2, 0x80) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) 00:51:42 executing program 2: clone(0x800410000020a, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x40) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) io_setup(0x19, &(0x7f0000000200)=0x0) io_getevents(r1, 0x6, 0x6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x0) 00:51:42 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:42 executing program 4: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4b, 0x0, &(0x7f0000000040)) sendfile(0xffffffffffffffff, r1, &(0x7f00000000c0)=0xb80, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @rand_addr="ac021c0158eab1caa6e4f4989e3495ca"}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x88001) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x800000004e22}, 0x1c) listen(r3, 0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xfe40) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x7, 0x0, 0x0) fchmod(r4, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r5, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r5, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0xffffffffffffff7a) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r6 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 3555.449547] audit_printk_skb: 2811 callbacks suppressed [ 3555.449554] audit: type=1400 audit(1574988702.343:434204): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.456466] audit: type=1400 audit(1574988702.353:434205): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.458402] audit: type=1400 audit(1574988702.353:434206): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.460257] audit: type=1400 audit(1574988702.353:434207): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.462988] audit: type=1400 audit(1574988702.353:434208): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2$9p(0x0, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 00:51:42 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) write$tun(0xffffffffffffffff, 0x0, 0x0) clone(0x3ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) sendmsg$unix(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, 0x0, 0x0) 00:51:42 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3555.561154] audit: type=1400 audit(1574988702.453:434209): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.563281] audit: type=1400 audit(1574988702.453:434210): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.564925] audit: type=1400 audit(1574988702.463:434211): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:42 executing program 2: clone(0x800410000020a, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0x40) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) io_setup(0x19, &(0x7f0000000200)=0x0) io_getevents(r1, 0x6, 0x6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x0) 00:51:43 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3555.566697] audit: type=1400 audit(1574988702.463:434212): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3555.568541] audit: type=1400 audit(1574988702.463:434213): avc: denied { net_admin } for pid=2071 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3556.084445] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 00:51:44 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:44 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:44 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) write$tun(0xffffffffffffffff, 0x0, 0x0) clone(0x3ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) sendmsg$unix(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, 0x0, 0x0) 00:51:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f00000008c0)=""/118, 0x76}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/245, 0xf5}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x2a80, 0x0, 0x0, 0x800e00506) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r5, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3}, 0x0) shutdown(r4, 0x0) shutdown(r1, 0x0) 00:51:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 00:51:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) 00:51:44 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3558.005106] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 00:51:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0xffffffffffffff77, 0x0, 0x337, 0x0, 0x1d7}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) 00:51:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:45 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:45 executing program 3: r0 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0xffffffffffffff91, 0x0, &(0x7f0000000000)=[@decrefs, @acquire_done], 0x0, 0x0, 0x0}) 00:51:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) 00:51:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:45 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) 00:51:45 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199783b0a82f79b32b4c8225086600a38e07d4db88a66596759e95307b680ab73e03d53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24dd620b2022d5ad63b369aaffe900b608a5fece0eca95d71f2d3e60613a027fb50cbcbd", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:51:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x20402, 0x0) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 00:51:45 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:45 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x3, 0x100000001) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 00:51:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) 00:51:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:46 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:46 executing program 0: 00:51:46 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:46 executing program 2: 00:51:46 executing program 0: 00:51:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:46 executing program 4: 00:51:46 executing program 3: 00:51:46 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:46 executing program 0: 00:51:46 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, 0x0, 0x0, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:46 executing program 0: 00:51:46 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) bind$packet(r0, &(0x7f0000000080), 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:47 executing program 2: 00:51:47 executing program 0: 00:51:47 executing program 3: 00:51:47 executing program 0: 00:51:47 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:47 executing program 4: 00:51:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff, "d50177f4122dcebb6b03029d5ac656e4d652aecdc859a7e2b02010d1a3f1e7a1be43a87fe2ed0a080f81c0658c20c460862455985af5c741cba6972427b465ac", "791d4b7d7cda3cbc8a167fffebdcbf0c447981ef6246895d8a37384dcd1b7bab"}) [ 3560.455173] audit_printk_skb: 3328 callbacks suppressed [ 3560.455180] audit: type=1400 audit(1574988707.353:435324): avc: denied { net_admin } for pid=25465 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.487716] audit: type=1400 audit(1574988707.393:435325): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:47 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3560.489524] audit: type=1400 audit(1574988707.393:435326): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.490343] audit: type=1400 audit(1574988707.393:435327): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:47 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3560.496354] audit: type=1400 audit(1574988707.393:435328): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.498127] audit: type=1400 audit(1574988707.393:435329): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.499865] audit: type=1400 audit(1574988707.393:435330): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.501752] audit: type=1400 audit(1574988707.393:435331): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.503432] audit: type=1400 audit(1574988707.393:435332): avc: denied { net_admin } for pid=2067 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3560.509016] audit: type=1400 audit(1574988707.403:435333): avc: denied { sys_admin } for pid=2068 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3561.153980] [ 3561.155653] ====================================================== [ 3561.161957] [ INFO: possible circular locking dependency detected ] [ 3561.168354] 4.9.141+ #23 Not tainted [ 3561.172054] ------------------------------------------------------- [ 3561.178553] syz-executor.2/15668 is trying to acquire lock: [ 3561.184238] (&bdev->bd_mutex){+.+.+.}, at: [] blkdev_reread_part+0x1e/0x40 [ 3561.193263] but task is already holding lock: [ 3561.197901] (&lo->lo_ctl_mutex#2){+.+.+.}, at: [] lo_compat_ioctl+0x103/0x140 [ 3561.207339] which lock already depends on the new lock. [ 3561.207339] [ 3561.214325] [ 3561.214325] the existing dependency chain (in reverse order) is: [ 3561.221919] -> #2 (&lo->lo_ctl_mutex#2){+.+.+.}: [ 3561.227457] lock_acquire+0x130/0x3e0 [ 3561.231755] mutex_lock_nested+0xc0/0x900 [ 3561.236399] lo_release+0x85/0x1a0 [ 3561.240439] __blkdev_put+0x636/0x840 [ 3561.244740] blkdev_put+0x85/0x560 [ 3561.248795] blkdev_close+0x8b/0xb0 [ 3561.252920] __fput+0x263/0x700 [ 3561.256814] ____fput+0x15/0x20 [ 3561.260692] task_work_run+0x10c/0x180 [ 3561.265091] exit_to_usermode_loop+0x129/0x150 [ 3561.270197] do_syscall_64+0x3e2/0x550 [ 3561.274590] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 3561.280186] -> #1 (loop_index_mutex){+.+.+.}: [ 3561.285357] lock_acquire+0x130/0x3e0 [ 3561.289661] mutex_lock_nested+0xc0/0x900 [ 3561.294312] lo_open+0x1b/0xa0 [ 3561.297997] __blkdev_get+0x263/0xd60 [ 3561.302292] blkdev_get+0x2da/0x920 [ 3561.306430] blkdev_open+0x1a5/0x250 [ 3561.310639] do_dentry_open+0x3ef/0xc90 [ 3561.315117] vfs_open+0x11c/0x210 [ 3561.319075] path_openat+0x542/0x2790 [ 3561.323372] do_filp_open+0x197/0x270 [ 3561.327725] do_sys_open+0x30d/0x5c0 [ 3561.331937] SyS_open+0x2d/0x40 [ 3561.335719] do_syscall_64+0x19f/0x550 [ 3561.340107] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 3561.345703] -> #0 (&bdev->bd_mutex){+.+.+.}: [ 3561.350754] __lock_acquire+0x3189/0x4a10 [ 3561.355403] lock_acquire+0x130/0x3e0 [ 3561.359701] mutex_lock_nested+0xc0/0x900 [ 3561.364347] blkdev_reread_part+0x1e/0x40 [ 3561.368988] loop_reread_partitions+0x7c/0x90 [ 3561.373977] loop_set_status+0xa7e/0xfe0 [ 3561.378533] loop_set_status_compat+0x9a/0xf0 [ 3561.383524] lo_compat_ioctl+0x10e/0x140 [ 3561.388169] compat_blkdev_ioctl+0x3a4/0x3630 [ 3561.393161] compat_SyS_ioctl+0x12d/0x1fd0 [ 3561.397936] do_fast_syscall_32+0x2f1/0xa10 [ 3561.402758] entry_SYSENTER_compat+0x90/0xa2 [ 3561.407777] [ 3561.407777] other info that might help us debug this: [ 3561.407777] [ 3561.415925] Chain exists of: &bdev->bd_mutex --> loop_index_mutex --> &lo->lo_ctl_mutex#2 [ 3561.425624] Possible unsafe locking scenario: [ 3561.425624] [ 3561.431662] CPU0 CPU1 [ 3561.436307] ---- ---- [ 3561.440947] lock(&lo->lo_ctl_mutex#2); [ 3561.445382] lock(loop_index_mutex); [ 3561.451918] lock(&lo->lo_ctl_mutex#2); [ 3561.458842] lock(&bdev->bd_mutex); [ 3561.462832] [ 3561.462832] *** DEADLOCK *** [ 3561.462832] [ 3561.468904] 1 lock held by syz-executor.2/15668: [ 3561.473631] #0: (&lo->lo_ctl_mutex#2){+.+.+.}, at: [] lo_compat_ioctl+0x103/0x140 [ 3561.483605] [ 3561.483605] stack backtrace: [ 3561.488083] CPU: 0 PID: 15668 Comm: syz-executor.2 Not tainted 4.9.141+ #23 [ 3561.495159] ffff8800a3c1f788 ffffffff81b42e79 ffffffff83c8e360 ffffffff83cb3f80 [ 3561.503166] ffffffff83c8d5e0 ffff8801a9f088d0 ffff8801a9f08000 ffff8800a3c1f7d0 [ 3561.511190] ffffffff813fee40 0000000000000001 00000000a9f088b0 0000000000000001 [ 3561.519193] Call Trace: [ 3561.521776] [] dump_stack+0xc1/0x128 [ 3561.527127] [] print_circular_bug.cold.36+0x2f7/0x432 [ 3561.533942] [] __lock_acquire+0x3189/0x4a10 [ 3561.539908] [] ? kasan_slab_free+0x119/0x190 [ 3561.545939] [] ? trace_hardirqs_on+0x10/0x10 [ 3561.551991] [] ? __lock_acquire+0x654/0x4a10 [ 3561.558023] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 3561.564845] [] lock_acquire+0x130/0x3e0 [ 3561.570457] [] ? blkdev_reread_part+0x1e/0x40 [ 3561.576576] [] ? blkdev_reread_part+0x1e/0x40 [ 3561.582697] [] mutex_lock_nested+0xc0/0x900 [ 3561.588643] [] ? blkdev_reread_part+0x1e/0x40 [ 3561.594798] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 3561.601542] [] ? mutex_trylock+0x3e0/0x3e0 [ 3561.607406] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 3561.614337] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 3561.621154] [] blkdev_reread_part+0x1e/0x40 [ 3561.627364] [] loop_reread_partitions+0x7c/0x90 [ 3561.633655] [] loop_set_status+0xa7e/0xfe0 [ 3561.639522] [] loop_set_status_compat+0x9a/0xf0 [ 3561.645819] [] ? loop_set_status+0xfe0/0xfe0 [ 3561.651858] [] lo_compat_ioctl+0x10e/0x140 [ 3561.657717] [] ? lo_ioctl+0x1910/0x1910 [ 3561.663413] [] compat_blkdev_ioctl+0x3a4/0x3630 [ 3561.669715] [] ? __fget+0x214/0x3d0 [ 3561.674978] [] ? cfq_merged_request+0x110/0x110 [ 3561.681274] [] ? __fget+0x23b/0x3d0 [ 3561.686529] [] ? __fget+0x47/0x3d0 [ 3561.691695] [] ? security_file_ioctl+0x8f/0xc0 [ 3561.697911] [] ? cfq_merged_request+0x110/0x110 [ 3561.704220] [] compat_SyS_ioctl+0x12d/0x1fd0 [ 3561.710389] [] ? do_ioctl+0x60/0x60 [ 3561.715644] [] do_fast_syscall_32+0x2f1/0xa10 [ 3561.721765] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3561.728415] [] entry_SYSENTER_compat+0x90/0xa2 [ 3561.735391] loop_reread_partitions: partition scan of loop0 (w-λkZVRY ѣ硾C [ 3561.735391] e `$UZA˦$'e) failed (rc=-13) 00:51:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, 0x0, 0x0, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:50 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:50 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) 00:51:50 executing program 5: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a8", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:51:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff, "d50177f4122dcebb6b03029d5ac656e4d652aecdc859a7e2b02010d1a3f1e7a1be43a87fe2ed0a080f81c0658c20c460862455985af5c741cba6972427b465ac", "791d4b7d7cda3cbc8a167fffebdcbf0c447981ef6246895d8a37384dcd1b7bab"}) 00:51:50 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:50 executing program 5: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:50 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:50 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) 00:51:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, 0x0, 0x0, 0x10400003) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:50 executing program 5: r0 = socket(0x0, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:50 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:50 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:50 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:50 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a8", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:51:53 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:53 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffff7fffffffe) 00:51:53 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:53 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) [ 3566.168844] audit_printk_skb: 1839 callbacks suppressed [ 3566.168852] audit: type=1400 audit(1574988713.063:435947): avc: denied { sys_admin } for pid=25465 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:53 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe) 00:51:53 executing program 2: pipe(&(0x7f0000000200)) 00:51:53 executing program 5: r0 = socket(0x200000000000011, 0x0, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) [ 3566.197492] audit: type=1400 audit(1574988713.083:435948): avc: denied { net_raw } for pid=15718 comm="syz-executor.5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:53 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0x2c4}, 0x40) [ 3566.228430] audit: type=1400 audit(1574988713.113:435949): avc: denied { net_raw } for pid=15721 comm="syz-executor.4" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.236142] audit: type=1400 audit(1574988713.113:435950): avc: denied { prog_load } for pid=15721 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3566.248137] audit: type=1400 audit(1574988713.143:435951): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.249513] audit: type=1400 audit(1574988713.143:435952): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.252262] audit: type=1400 audit(1574988713.143:435953): avc: denied { sys_admin } for pid=2069 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.256629] audit: type=1400 audit(1574988713.143:435954): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.257554] audit: type=1400 audit(1574988713.143:435955): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3566.260089] audit: type=1400 audit(1574988713.143:435956): avc: denied { sys_admin } for pid=2067 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:51:53 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:53 executing program 2: pipe(&(0x7f0000000200)) 00:51:53 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001380)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a8", 0x1c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:51:56 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xc) keyctl$get_keyring_id(0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='/'], 0xfffffffffffffec4) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a07, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) mount$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x104000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="6a5721b3bc560ef67ad400bb41f384ef0e66569a26fda44069710d4857119da3993293a7f6836e0a7ec048c35ea25097bb3b83e94250c60372cb7186bae3bb47ac2fbf8574a7ec58ebfca217d671f8bb7ad500c6f903badf3f1b80ef0a07424b30af5582b08f7653813c051f"], &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="4126d3b9e275d455ffa65c6d35f5fe2eb4baba45fbb5410819dc7a3761bd91b212922b13108a17b43220a04f443f5fe3ba1c691e31672bb50c218157d5e11018f6f1b789604dbb3dbcd2ea9b"], &(0x7f0000000140)='.', 0x0, 0x2003002480, 0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000300)={0x0, 0x1, 0x6, 0x0, 0x24e0, 0xfffffff8}) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) wait4(r1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 00:51:56 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe) 00:51:56 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 00:51:56 executing program 2: pipe(&(0x7f0000000200)) 00:51:56 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:56 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe) 00:51:56 executing program 2: pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe) 00:51:56 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:51:56 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x2c6) r1 = socket$packet(0x11, 0x3, 0x300) fcntl$getownex(r1, 0x10, &(0x7f0000000300)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:51:56 executing program 3: pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe) 00:51:56 executing program 3: pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffff7fffffffe)