, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) utime(&(0x7f0000000400)='./bus\x00', &(0x7f0000000440)) 01:21:19 executing program 4: r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000080)=""/8, 0x8}], 0x2) 01:21:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:22 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(r0) 01:21:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) 01:21:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000080)=""/8, 0x8}], 0x2) 01:21:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:22 executing program 4: syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000080)=""/8, 0x8}], 0x2) 01:21:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) [ 2552.677419] audit_printk_skb: 996 callbacks suppressed [ 2552.677427] audit: type=1400 audit(1575076883.170:379206): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.686878] audit: type=1400 audit(1575076883.180:379207): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:23 executing program 4: syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000080)=""/8, 0x8}], 0x2) [ 2552.691197] audit: type=1400 audit(1575076883.180:379208): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.696526] audit: type=1400 audit(1575076883.180:379209): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.725419] audit: type=1400 audit(1575076883.210:379210): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.730796] audit: type=1400 audit(1575076883.220:379211): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.735195] audit: type=1400 audit(1575076883.220:379212): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.836534] audit: type=1400 audit(1575076883.330:379213): avc: denied { dac_override } for pid=27951 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.853188] audit: type=1400 audit(1575076883.340:379214): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2552.854877] audit: type=1400 audit(1575076883.340:379215): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:23 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:21:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)=0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r7, r1) fcntl$setstatus(r1, 0x4, 0x44800) r8 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r8, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) 01:21:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e2c21f8761f2833f7cebad02000014cf2e1c9d4984680d20858337f825600b1880b4ce234b5efe30f744e96f14e1bf5122f9e905006742df0000000100000001c155cc46eb93e3bf00cce8fd907f03788af042c7d22f148d476dbed492b1603b9479e5fa45551a0000500000009b29b9a550bb4384130e703a0000000000003267446f90ab19765d321eb0a54acab6e5a4e9fdd9425a75abda711f454d18013e30a7ffa4d1ad00253d54b2eaab85dd16f7dc52deddaf97c5cb7691fc238ce1084de2e85151025a38109354fd0ac8b2f7d9ce540d2d28f8a777ccaf981502b98f1d3dc6f6a8ce5e1f2c871bb7ea616e8b789fc3f52deb4073b8097b5f76a74bfe12a91ff532eaa799059d11c8195ccbfa06c4ec0217d48999fe209b3f08469fbb622c16d1e31e6bdaacb377f7cd61bbf5d246a71f60b05141e7d1c6a3554a52b148a968aa8d724a931e7c01f976594b7d20e62d241268f002b195250107ea71df32a075eb8ff1e5b500"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) 01:21:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, 0x0, 0x0) 01:21:25 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:21:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r7, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r7, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) 01:21:26 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:21:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, 0x0, 0x0) 01:21:26 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:21:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) 01:21:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 01:21:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, 0x0, 0x0) 01:21:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) 01:21:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) [ 2558.829059] audit_printk_skb: 1494 callbacks suppressed [ 2558.829068] audit: type=1400 audit(1575076889.320:379714): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="02071604020000000e0101000001000325f10ff59b42a1796fdec5eba45d92d5f0b24839bada3f03004a076462284d8bf691568bc7fd000465bd1bd624f7b180cd9f12cb84c61d7503000000d41fd10060cddccd37fe426c871390b0a68fbd3dfc6679b089f6dcabe572ce762d3c9eaf0ded5fef07d8ad4946cf3eda78e07dc9924e0000000000000000665e9ba93d2947507a65cf7b38a2af1a5f441bef52f031527ecc72ed1e308c6b10f363679002f8342dd1488e1e9646719305c2ba50b26c36"], 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) 01:21:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) [ 2558.947553] audit: type=1400 audit(1575076889.440:379715): avc: denied { net_admin } for pid=28015 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.958646] audit: type=1400 audit(1575076889.450:379717): avc: denied { dac_override } for pid=28017 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.962295] audit: type=1400 audit(1575076889.440:379716): avc: denied { dac_override } for pid=28018 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) 01:21:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) [ 2558.963741] audit: type=1400 audit(1575076889.450:379718): avc: denied { dac_override } for pid=28019 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.977114] audit: type=1400 audit(1575076889.470:379719): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) [ 2558.978964] audit: type=1400 audit(1575076889.470:379720): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.983255] audit: type=1400 audit(1575076889.470:379721): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) fcntl$setstatus(r1, 0x4, 0x44800) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2558.984479] audit: type=1400 audit(1575076889.470:379722): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2558.985071] audit: type=1400 audit(1575076889.470:379723): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:33 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:21:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) 01:21:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x400006a, 0x0) 01:21:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) 01:21:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r7, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2) 01:21:34 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2) 01:21:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 01:21:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2563.837199] audit_printk_skb: 1098 callbacks suppressed [ 2563.837207] audit: type=1400 audit(1575076894.330:380091): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.845827] audit: type=1400 audit(1575076894.320:380088): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.845854] audit: type=1400 audit(1575076894.340:380092): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.848688] audit: type=1400 audit(1575076894.340:380093): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.849747] audit: type=1400 audit(1575076894.340:380094): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.851471] audit: type=1400 audit(1575076894.340:380095): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.855035] audit: type=1400 audit(1575076894.340:380096): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.855833] audit: type=1400 audit(1575076894.340:380097): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.859027] audit: type=1400 audit(1575076894.350:380098): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2563.860523] audit: type=1400 audit(1575076894.350:380099): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}, {0x0}], 0x2) 01:21:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:36 executing program 3: sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 01:21:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:21:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1) 01:21:37 executing program 3: sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1) 01:21:37 executing program 3: sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) INIT: Id "6" respawning too fast: disabled for 5 minutes 01:21:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r5, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_setup(0x4, &(0x7f0000000040)) dup2(0xffffffffffffffff, r1) 01:21:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:21:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:40 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) 01:21:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r6, r1) 01:21:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r4, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:40 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) [ 2569.733690] audit_printk_skb: 1410 callbacks suppressed [ 2569.733699] audit: type=1400 audit(1575076900.220:380570): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) [ 2569.841656] audit: type=1400 audit(1575076900.330:380571): avc: denied { dac_override } for pid=28147 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:40 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2569.845336] audit: type=1400 audit(1575076900.330:380572): avc: denied { dac_override } for pid=28143 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.849593] audit: type=1400 audit(1575076900.340:380573): avc: denied { dac_override } for pid=28144 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.870273] audit: type=1400 audit(1575076900.360:380574): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.876367] audit: type=1400 audit(1575076900.370:380575): avc: denied { net_admin } for pid=28146 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:40 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2569.880032] audit: type=1400 audit(1575076900.370:380576): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.890384] audit: type=1400 audit(1575076900.380:380577): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2569.907490] audit: type=1400 audit(1575076900.400:380578): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:40 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/icmp6\x00') readv(r0, &(0x7f0000000480)=[{0x0}], 0x1) 01:21:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r5, r1) [ 2569.960015] audit: type=1400 audit(1575076900.450:380579): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 INIT: Id "5" respawning too fast: disabled for 5 minutes 01:21:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:44 executing program 4: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x24) 01:21:44 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:21:44 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r3, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r4, r1) 01:21:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000000), 0x0}, 0x20) 01:21:44 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x3}]}}, &(0x7f00000002c0)=""/236, 0x26, 0xec, 0x8}, 0x20) 01:21:44 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r2, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r4, r1) 01:21:44 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2574.737033] audit_printk_skb: 1296 callbacks suppressed [ 2574.737041] audit: type=1400 audit(1575076905.230:381012): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.737394] audit: type=1400 audit(1575076905.230:381013): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.741152] audit: type=1400 audit(1575076905.230:381014): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.751751] audit: type=1400 audit(1575076905.240:381015): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.765374] audit: type=1400 audit(1575076905.250:381016): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.770561] audit: type=1400 audit(1575076905.260:381017): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.772305] audit: type=1400 audit(1575076905.260:381018): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.823049] audit: type=1400 audit(1575076905.310:381019): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.849744] audit: type=1400 audit(1575076905.340:381020): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2574.869125] audit: type=1400 audit(1575076905.360:381021): avc: denied { net_admin } for pid=28213 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 01:21:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e2c21f8761f2833f7cebad02000014cf2e1c9d4984680d20858337f825600b1880b4ce234b5efe30f744e96f14e1bf5122f9e905006742df0000000100000001c155cc46eb93e3bf00cce8fd907f03788af042c7d22f148d476dbed492b1603b9479e5fa45551a0000500000009b29b9a550bb4384130e703a0000000000003267446f90ab19765d321eb0a54acab6e5a4e9fdd9425a75abda711f454d18013e30a7ffa4d1ad00253d54b2eaab85dd16f7dc52deddaf97c5cb7691fc238ce1084de2e85151025a38109354fd0ac8b2f7d9ce540d2d28f8a777ccaf981502b98f1d3dc6f6a8ce5e1f2c871bb7ea616e8b789fc3f52deb4073b8097b5f76a74bfe12a91ff532eaa799059d11c8195ccbfa06c4ec0217d48999fe209b3f08469fbb622c16d1e31e6bdaacb377f7cd61bbf5d246a71f60b05141e7d1c6a3554a52b148a968aa8d724a931e7c01f976594b7d20e62d241268f002b195250107ea71df32a075eb8ff1e5b500"/375], 0x0, 0x7c, 0xb9}, 0x20) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:47 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:21:47 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x400002100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) tkill(r1, 0x1000000000016) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r3 = gettid() tkill(r3, 0x1000000000015) 01:21:47 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfb120eb7) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r4, r1) 01:21:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r1, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r1, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:47 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:47 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x400002100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) tkill(r1, 0x1000000000016) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r3 = gettid() tkill(r3, 0x1000000000015) 01:21:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r1, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfb120eb7) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r3, r1) 01:21:48 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) pipe(&(0x7f0000000000)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:21:50 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:21:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:50 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x400002100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) tkill(r1, 0x1000000000016) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r3 = gettid() tkill(r3, 0x1000000000015) 01:21:50 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2580.416778] audit_printk_skb: 1176 callbacks suppressed [ 2580.416787] audit: type=1400 audit(1575076910.910:381414): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:21:51 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2580.541455] audit: type=1400 audit(1575076911.030:381415): avc: denied { net_admin } for pid=28269 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2580.541551] audit: type=1400 audit(1575076911.030:381416): avc: denied { dac_override } for pid=28271 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2580.549961] audit: type=1400 audit(1575076911.030:381417): avc: denied { dac_override } for pid=28271 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2580.568275] audit: type=1400 audit(1575076911.060:381418): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2580.572535] audit: type=1400 audit(1575076911.060:381419): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:51 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x400002100001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) tkill(r1, 0x1000000000016) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r3 = gettid() tkill(r3, 0x1000000000015) [ 2580.573889] audit: type=1400 audit(1575076911.060:381420): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) [ 2580.573930] audit: type=1400 audit(1575076911.060:381421): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:51 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2580.581555] audit: type=1400 audit(1575076911.070:381422): avc: denied { sys_admin } for pid=28272 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:51 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) [ 2580.582866] audit: type=1400 audit(1575076911.070:381423): avc: denied { sys_admin } for pid=28272 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:54 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:21:54 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 01:21:54 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) 01:21:54 executing program 5: r0 = open(0x0, 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:54 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:21:54 executing program 5: r0 = open(0x0, 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:54 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 01:21:54 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x4, r2, 0x1, 0x0, 0x6, @random="4374d134a602"}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 01:21:54 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB]}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:54 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(r0) [ 2585.426737] audit_printk_skb: 1611 callbacks suppressed [ 2585.426745] audit: type=1400 audit(1575076915.920:381961): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.458885] audit: type=1400 audit(1575076915.950:381962): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.488801] audit: type=1400 audit(1575076915.980:381963): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.518484] audit: type=1400 audit(1575076916.010:381964): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.547759] audit: type=1400 audit(1575076916.040:381965): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.577336] audit: type=1400 audit(1575076916.070:381966): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.604629] audit: type=1400 audit(1575076916.090:381967): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.631379] audit: type=1400 audit(1575076916.120:381968): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.657961] audit: type=1400 audit(1575076916.150:381969): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2585.684677] audit: type=1400 audit(1575076916.170:381970): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:21:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:57 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(r0) 01:21:57 executing program 5: r0 = open(0x0, 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:57 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:21:57 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e39179"], 0x6c}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x2}]}]}}, &(0x7f00000002c0)=""/236, 0x32, 0xec, 0x8}, 0x20) 01:21:57 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) 01:21:57 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:21:57 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:21:57 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e39179"], 0x6c}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:21:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 01:21:58 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:22:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:00 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e39179"], 0x6c}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:00 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:22:00 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:22:00 executing program 4: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000040), 0x40000000, 0x0) gettid() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000140)) ptrace(0x10, r0) 01:22:00 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(r0) 01:22:00 executing program 5: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:22:00 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda85000000000200"], 0xa2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2590.438441] audit_printk_skb: 900 callbacks suppressed 01:22:00 executing program 1: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) [ 2590.441366] audit: type=1400 audit(1575076920.930:382271): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) open$dir(0x0, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) close(r2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x101040, 0x0) getpeername$inet6(r5, &(0x7f0000000300), &(0x7f00000003c0)=0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f0000000380)) inotify_add_watch(r7, &(0x7f0000000340)='./bus/../file0\x00', 0x80000002) r10 = creat(0x0, 0x0) r11 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r11, 0x0, 0x1005, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r10}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[]}}, 0x0) [ 2590.448306] audit: type=1400 audit(1575076920.940:382272): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.450190] audit: type=1400 audit(1575076920.940:382273): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:01 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda85000000000200"], 0xa2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:01 executing program 5: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) [ 2590.459551] audit: type=1400 audit(1575076920.950:382274): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.465337] audit: type=1400 audit(1575076920.950:382275): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.475366] audit: type=1400 audit(1575076920.960:382276): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.488774] audit: type=1400 audit(1575076920.980:382277): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.492146] audit: type=1400 audit(1575076920.980:382278): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.493722] audit: type=1400 audit(1575076920.980:382279): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2590.504548] audit: type=1400 audit(1575076920.990:382280): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:02 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda85000000000200"], 0xa2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:02 executing program 1: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:22:02 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:02 executing program 5: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(0xffffffffffffffff, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}, {0x0}], 0x3) 01:22:02 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x19) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000380)={0x2, 'caif0\x00', {0x86b}, 0x7}) 01:22:02 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de"], 0xbd}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:02 executing program 1: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:22:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, 0x0, 0x0) 01:22:02 executing program 4: 01:22:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:02 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) 01:22:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:22:02 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de"], 0xbd}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, 0x0, 0x0) 01:22:02 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, 0x0, 0x0) 01:22:03 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de"], 0xbd}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:22:03 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) 01:22:03 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)="a2", 0x1}], 0x2) 01:22:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:22:03 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c3745"], 0xcb}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:03 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}], 0x1) 01:22:04 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) 01:22:04 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:04 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:22:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:06 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}], 0x1) 01:22:06 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c3745"], 0xcb}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:06 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) 01:22:06 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) 01:22:06 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) [ 2595.633165] audit_printk_skb: 2709 callbacks suppressed [ 2595.633172] audit: type=1400 audit(1575076926.120:383185): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2595.733141] audit: type=1400 audit(1575076926.220:383186): avc: denied { net_admin } for pid=28503 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:06 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}], 0x1) 01:22:06 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, r0) [ 2595.734155] audit: type=1400 audit(1575076926.220:383187): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2595.744004] audit: type=1400 audit(1575076926.220:383188): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2595.752715] audit: type=1400 audit(1575076926.220:383189): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:06 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 2595.790414] audit: type=1400 audit(1575076926.280:383190): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2595.797646] audit: type=1400 audit(1575076926.290:383191): avc: denied { dac_override } for pid=28504 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:06 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {0x0}], 0x2) 01:22:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) [ 2595.810277] audit: type=1400 audit(1575076926.300:383193): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:07 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) [ 2595.812427] audit: type=1400 audit(1575076926.300:383192): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2595.820846] audit: type=1400 audit(1575076926.300:383194): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:09 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {0x0}], 0x2) 01:22:09 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 01:22:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:22:09 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c3745"], 0xcb}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:09 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r2, r1) 01:22:09 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {0x0}], 0x2) 01:22:09 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c735"], 0xd2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:09 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) read(0xffffffffffffffff, 0x0, 0x0) 01:22:10 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)}], 0x2) 01:22:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x0, 0x0) dup2(r2, r1) 01:22:12 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:12 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)}], 0x2) 01:22:12 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYPTR]) 01:22:12 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c735"], 0xd2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:12 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x0, 0x0) dup2(r2, r1) [ 2602.222745] audit_printk_skb: 1600 callbacks suppressed [ 2602.222754] audit: type=1400 audit(1575076932.710:383730): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:12 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{0x0}, {&(0x7f0000003780)}], 0x2) [ 2602.322152] audit: type=1400 audit(1575076932.810:383731): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:12 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c735"], 0xd2}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2602.355995] audit: type=1400 audit(1575076932.840:383732): avc: denied { net_admin } for pid=28582 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:12 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) 01:22:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(0x0, 0x0, 0x0) dup2(r2, r1) [ 2602.377119] audit: type=1400 audit(1575076932.870:383733): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2602.378786] audit: type=1400 audit(1575076932.870:383734): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2602.381867] audit: type=1400 audit(1575076932.870:383735): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:13 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{&(0x7f0000003780)="a2", 0x1}], 0x1) 01:22:13 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f0000"], 0xd5}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2602.390742] audit: type=1400 audit(1575076932.880:383736): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2602.417222] audit: type=1400 audit(1575076932.910:383737): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2602.432841] audit: type=1400 audit(1575076932.920:383738): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2602.434627] audit: type=1400 audit(1575076932.920:383739): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:16 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) socket$inet_udp(0x2, 0x2, 0x0) 01:22:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r1) 01:22:16 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:16 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{&(0x7f0000003780)="a2", 0x1}], 0x1) 01:22:16 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f0000"], 0xd5}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:16 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000003700)=[{&(0x7f0000003780)="a2", 0x1}], 0x1) 01:22:16 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f0000"], 0xd5}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:16 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r1) 01:22:17 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:17 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c3"], 0xd7}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 01:22:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r1) 01:22:17 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r7 = syz_open_procfs(0x0, 0x0) read(r7, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2a) r8 = syz_open_procfs(0x0, 0x0) fchownat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r7, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r11 = gettid() ioprio_get$pid(0x1, r11) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r12 = syz_open_procfs(0x0, 0x0) r13 = socket$inet(0x10, 0x2, 0x0) sendmsg(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r12, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r15 = getgid() fchownat(r12, &(0x7f0000000000)='./file0\x00', r14, r15, 0x0) r16 = gettid() ioprio_get$pid(0x1, r16) r17 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r17, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r18 = socket$inet(0x10, 0x2, 0x0) sendmsg(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r17, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r20 = getgid() fchownat(r17, &(0x7f0000000000)='./file0\x00', r19, r20, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r21 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r21, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r21, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r22 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r22, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r24 = getgid() fchownat(r21, &(0x7f0000000000)='./file0\x00', r23, r24, 0x400) r25 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r25, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r26 = socket$inet(0x10, 0x2, 0x0) sendmsg(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r28 = getgid() fchownat(r25, &(0x7f0000000000)='./file0\x00', r27, r28, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r29 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r29, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r30 = socket$inet(0x10, 0x2, 0x0) sendmsg(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r29, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r30, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r32 = getgid() fchownat(r29, &(0x7f0000000000)='./file0\x00', r31, r32, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r29, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r33 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r33, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r34 = socket$inet(0x10, 0x2, 0x0) sendmsg(r34, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r33, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = getgid() fchownat(r33, &(0x7f0000000000)='./file0\x00', r35, r36, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r37 = socket$inet(0x10, 0x2, 0x0) sendmsg(r37, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r37, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = socket$inet(0x10, 0x2, 0x0) sendmsg(r38, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r40 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r39, r40, 0x400) sendmsg$unix(r3, &(0x7f00000002c0)={&(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="a0b67287ec8a7644ce11679f231305f5b1d53ad21441aea902f8a3ea7d6906a6e6e2e86fd72f14deacd403fbf2c8c6f6a3", 0x31}, {&(0x7f00000000c0)="2e2e11f63698cd44dd0b6b5dfd42", 0xe}], 0x2, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r24}}}], 0x20, 0x80}, 0x4000) 01:22:17 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:17 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) [ 2607.232579] audit_printk_skb: 1383 callbacks suppressed 01:22:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 2607.232588] audit: type=1400 audit(1575076937.720:384201): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2607.235001] audit: type=1400 audit(1575076937.720:384202): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c3"], 0xd7}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2607.256740] audit: type=1400 audit(1575076937.750:384203): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2607.258550] audit: type=1400 audit(1575076937.750:384204): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2607.264123] audit: type=1400 audit(1575076937.750:384205): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2607.266722] audit: type=1400 audit(1575076937.750:384206): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2607.271560] audit: type=1400 audit(1575076937.750:384207): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2607.287661] audit: type=1400 audit(1575076937.750:384208): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c3"], 0xd7}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) [ 2607.304618] audit: type=1400 audit(1575076937.790:384210): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 2607.307374] audit: type=1400 audit(1575076937.790:384209): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 01:22:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 01:22:18 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r7 = syz_open_procfs(0x0, 0x0) read(r7, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2a) r8 = syz_open_procfs(0x0, 0x0) fchownat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r7, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r11 = gettid() ioprio_get$pid(0x1, r11) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r12 = syz_open_procfs(0x0, 0x0) r13 = socket$inet(0x10, 0x2, 0x0) sendmsg(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r12, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r15 = getgid() fchownat(r12, &(0x7f0000000000)='./file0\x00', r14, r15, 0x0) r16 = gettid() ioprio_get$pid(0x1, r16) r17 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r17, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r18 = socket$inet(0x10, 0x2, 0x0) sendmsg(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r17, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r20 = getgid() fchownat(r17, &(0x7f0000000000)='./file0\x00', r19, r20, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r21 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r21, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r21, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r22 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r22, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r24 = getgid() fchownat(r21, &(0x7f0000000000)='./file0\x00', r23, r24, 0x400) r25 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r25, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r26 = socket$inet(0x10, 0x2, 0x0) sendmsg(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r28 = getgid() fchownat(r25, &(0x7f0000000000)='./file0\x00', r27, r28, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r29 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r29, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r30 = socket$inet(0x10, 0x2, 0x0) sendmsg(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r29, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r30, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r32 = getgid() fchownat(r29, &(0x7f0000000000)='./file0\x00', r31, r32, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r29, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r33 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r33, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r34 = socket$inet(0x10, 0x2, 0x0) sendmsg(r34, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r33, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = getgid() fchownat(r33, &(0x7f0000000000)='./file0\x00', r35, r36, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r37 = socket$inet(0x10, 0x2, 0x0) sendmsg(r37, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r37, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = socket$inet(0x10, 0x2, 0x0) sendmsg(r38, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r40 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r39, r40, 0x400) sendmsg$unix(r3, &(0x7f00000002c0)={&(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="a0b67287ec8a7644ce11679f231305f5b1d53ad21441aea902f8a3ea7d6906a6e6e2e86fd72f14deacd403fbf2c8c6f6a3", 0x31}, {&(0x7f00000000c0)="2e2e11f63698cd44dd0b6b5dfd42", 0xe}], 0x2, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r24}}}], 0x20, 0x80}, 0x4000) 01:22:18 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:18 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:19 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) 01:22:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 01:22:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:19 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:19 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) 01:22:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup2(r1, 0xffffffffffffffff) 01:22:20 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400006a, 0x0) 01:22:20 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$netlink(r1, &(0x7f0000000340)=@unspec, 0xc) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 01:22:20 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, 0x0, 0x0, 0x0) 01:22:20 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r7 = syz_open_procfs(0x0, 0x0) read(r7, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2a) r8 = syz_open_procfs(0x0, 0x0) fchownat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r7, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r11 = gettid() ioprio_get$pid(0x1, r11) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r12 = syz_open_procfs(0x0, 0x0) r13 = socket$inet(0x10, 0x2, 0x0) sendmsg(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r12, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r15 = getgid() fchownat(r12, &(0x7f0000000000)='./file0\x00', r14, r15, 0x0) r16 = gettid() ioprio_get$pid(0x1, r16) r17 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r17, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r18 = socket$inet(0x10, 0x2, 0x0) sendmsg(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r17, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r20 = getgid() fchownat(r17, &(0x7f0000000000)='./file0\x00', r19, r20, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r21 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r21, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r21, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r22 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r22, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r24 = getgid() fchownat(r21, &(0x7f0000000000)='./file0\x00', r23, r24, 0x400) r25 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r25, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r26 = socket$inet(0x10, 0x2, 0x0) sendmsg(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r28 = getgid() fchownat(r25, &(0x7f0000000000)='./file0\x00', r27, r28, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r29 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r29, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r30 = socket$inet(0x10, 0x2, 0x0) sendmsg(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r29, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r30, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r32 = getgid() fchownat(r29, &(0x7f0000000000)='./file0\x00', r31, r32, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r29, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r33 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r33, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r34 = socket$inet(0x10, 0x2, 0x0) sendmsg(r34, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r33, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = getgid() fchownat(r33, &(0x7f0000000000)='./file0\x00', r35, r36, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r37 = socket$inet(0x10, 0x2, 0x0) sendmsg(r37, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r37, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = socket$inet(0x10, 0x2, 0x0) sendmsg(r38, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r40 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r39, r40, 0x400) sendmsg$unix(r3, &(0x7f00000002c0)={&(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="a0b67287ec8a7644ce11679f231305f5b1d53ad21441aea902f8a3ea7d6906a6e6e2e86fd72f14deacd403fbf2c8c6f6a3", 0x31}, {&(0x7f00000000c0)="2e2e11f63698cd44dd0b6b5dfd42", 0xe}], 0x2, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r24}}}], 0x20, 0x80}, 0x4000) 01:22:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:20 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:20 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, 0x0, 0x0, 0x0) 01:22:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r1, 0x0, 0x0) 01:22:21 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000640)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:21 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) read$FUSE(r2, &(0x7f0000003340), 0x60) close(r1) 01:22:21 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, 0x0, 0x0, 0x0) 01:22:21 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="9a"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:22:21 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:21 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008001) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) 01:22:22 executing program 5: syz_emit_ethernet(0x300502, &(0x7f0000000000)=ANY=[@ANYBLOB="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"/326], 0x0) 01:22:22 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r7 = syz_open_procfs(0x0, 0x0) read(r7, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2a) r8 = syz_open_procfs(0x0, 0x0) fchownat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r7, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r11 = gettid() ioprio_get$pid(0x1, r11) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r12 = syz_open_procfs(0x0, 0x0) r13 = socket$inet(0x10, 0x2, 0x0) sendmsg(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r12, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r15 = getgid() fchownat(r12, &(0x7f0000000000)='./file0\x00', r14, r15, 0x0) r16 = gettid() ioprio_get$pid(0x1, r16) r17 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r17, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r18 = socket$inet(0x10, 0x2, 0x0) sendmsg(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r17, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r20 = getgid() fchownat(r17, &(0x7f0000000000)='./file0\x00', r19, r20, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r21 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r21, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r21, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r22 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r22, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r24 = getgid() fchownat(r21, &(0x7f0000000000)='./file0\x00', r23, r24, 0x400) r25 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r25, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r26 = socket$inet(0x10, 0x2, 0x0) sendmsg(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r28 = getgid() fchownat(r25, &(0x7f0000000000)='./file0\x00', r27, r28, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r29 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r29, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r30 = socket$inet(0x10, 0x2, 0x0) sendmsg(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r29, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r30, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r32 = getgid() fchownat(r29, &(0x7f0000000000)='./file0\x00', r31, r32, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r29, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r33 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r33, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r34 = socket$inet(0x10, 0x2, 0x0) sendmsg(r34, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r33, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = getgid() fchownat(r33, &(0x7f0000000000)='./file0\x00', r35, r36, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r37 = socket$inet(0x10, 0x2, 0x0) sendmsg(r37, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r37, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = socket$inet(0x10, 0x2, 0x0) sendmsg(r38, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r40 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r39, r40, 0x400) sendmsg$unix(r3, &(0x7f00000002c0)={&(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="a0b67287ec8a7644ce11679f231305f5b1d53ad21441aea902f8a3ea7d6906a6e6e2e86fd72f14deacd403fbf2c8c6f6a3", 0x31}, {&(0x7f00000000c0)="2e2e11f63698cd44dd0b6b5dfd42", 0xe}], 0x2, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r24}}}], 0x20, 0x80}, 0x4000) 01:22:22 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:22 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:22:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006900)=[{{&(0x7f0000000f40)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@flowinfo={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x105e}}], 0x30}}], 0x1, 0x0) [ 2612.237291] audit_printk_skb: 2712 callbacks suppressed [ 2612.237299] audit: type=1400 audit(1575076942.730:385115): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.260507] audit: type=1400 audit(1575076942.750:385116): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.266926] audit: type=1400 audit(1575076942.760:385118): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.268075] audit: type=1400 audit(1575076942.750:385117): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.272203] audit: type=1400 audit(1575076942.760:385119): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.273425] audit: type=1400 audit(1575076942.760:385120): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.290307] audit: type=1400 audit(1575076942.780:385121): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.298768] audit: type=1400 audit(1575076942.780:385122): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.385760] audit: type=1400 audit(1575076942.870:385123): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2612.387687] audit: type=1400 audit(1575076942.880:385124): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r1, 0x0, 0x0) 01:22:24 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:24 executing program 5: 01:22:24 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:22:24 executing program 3: 01:22:24 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) r4 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r7 = syz_open_procfs(0x0, 0x0) read(r7, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r6, 0x4b4e, 0x2a) r8 = syz_open_procfs(0x0, 0x0) fchownat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r7, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r11 = gettid() ioprio_get$pid(0x1, r11) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r12 = syz_open_procfs(0x0, 0x0) r13 = socket$inet(0x10, 0x2, 0x0) sendmsg(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r12, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r15 = getgid() fchownat(r12, &(0x7f0000000000)='./file0\x00', r14, r15, 0x0) r16 = gettid() ioprio_get$pid(0x1, r16) r17 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r17, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r18 = socket$inet(0x10, 0x2, 0x0) sendmsg(r18, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r17, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r18, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r20 = getgid() fchownat(r17, &(0x7f0000000000)='./file0\x00', r19, r20, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r21 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r21, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r21, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r22 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r22, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r24 = getgid() fchownat(r21, &(0x7f0000000000)='./file0\x00', r23, r24, 0x400) r25 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r25, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r26 = socket$inet(0x10, 0x2, 0x0) sendmsg(r26, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r28 = getgid() fchownat(r25, &(0x7f0000000000)='./file0\x00', r27, r28, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r29 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r29, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r30 = socket$inet(0x10, 0x2, 0x0) sendmsg(r30, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r29, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r30, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r32 = getgid() fchownat(r29, &(0x7f0000000000)='./file0\x00', r31, r32, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r29, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r33 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r33, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r34 = socket$inet(0x10, 0x2, 0x0) sendmsg(r34, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r33, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r34, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = getgid() fchownat(r33, &(0x7f0000000000)='./file0\x00', r35, r36, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r37 = socket$inet(0x10, 0x2, 0x0) sendmsg(r37, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r37, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = socket$inet(0x10, 0x2, 0x0) sendmsg(r38, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r38, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r40 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r39, r40, 0x400) sendmsg$unix(r3, &(0x7f00000002c0)={&(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)="a0b67287ec8a7644ce11679f231305f5b1d53ad21441aea902f8a3ea7d6906a6e6e2e86fd72f14deacd403fbf2c8c6f6a3", 0x31}, {&(0x7f00000000c0)="2e2e11f63698cd44dd0b6b5dfd42", 0xe}], 0x2, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r24}}}], 0x20, 0x80}, 0x4000) 01:22:24 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r0, 0x540c) 01:22:24 executing program 3: ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x24c, 0x0) r0 = gettid() openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x800000000000014) 01:22:24 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(0xffffffffffffffff, &(0x7f0000003340), 0x60) close(r1) 01:22:24 executing program 4: socket(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:24 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1) ioctl(r0, 0x40001000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0xbd, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f0000000440), 0x0}, 0x20) 01:22:24 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, 0x0, 0x0) close(r1) 01:22:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r1, 0x0, 0x0) 01:22:27 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000000c0)=[{r0}, {r0}], 0x2, 0x9) 01:22:27 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f0000000100)=0x54) 01:22:27 executing program 4: socket(0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:27 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, 0x0, 0x0) close(r1) 01:22:27 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = socket$inet(0x10, 0x2, 0x0) sendmsg(r36, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r36, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r38 = getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r37, r38, 0x400) 01:22:27 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000001100)=""/53, 0xfcd8}, {&(0x7f0000001340)=""/223, 0x68}], 0x2, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0xd4, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 01:22:27 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 01:22:27 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) read$FUSE(r2, 0x0, 0x0) close(r1) 01:22:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2617.250481] audit_printk_skb: 1287 callbacks suppressed [ 2617.250490] audit: type=1400 audit(1575076947.740:385554): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) [ 2617.264682] audit: type=1400 audit(1575076947.750:385555): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0xa4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2617.267165] audit: type=1400 audit(1575076947.760:385556): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.269051] audit: type=1400 audit(1575076947.760:385557): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.271013] audit: type=1400 audit(1575076947.760:385558): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.272843] audit: type=1400 audit(1575076947.760:385559): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.274605] audit: type=1400 audit(1575076947.760:385560): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.276718] audit: type=1400 audit(1575076947.770:385561): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.278677] audit: type=1400 audit(1575076947.770:385562): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2617.284303] audit: type=1400 audit(1575076947.770:385563): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:30 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:22:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:30 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) 01:22:30 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = socket$inet(0x10, 0x2, 0x0) sendmsg(r36, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r36, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() 01:22:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x2, 0x4, 0x4, 0x100000009}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x2, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r0}], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1127, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:22:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:31 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = socket$inet(0x10, 0x2, 0x0) sendmsg(r36, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r36, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:22:33 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:33 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:22:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) 01:22:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:33 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:33 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r36 = socket$inet(0x10, 0x2, 0x0) sendmsg(r36, 0x0, 0x0) [ 2623.288602] audit_printk_skb: 1476 callbacks suppressed 01:22:33 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) [ 2623.288611] audit: type=1400 audit(1575076953.780:386056): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:33 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="8500000007000000c60000000000be009500000000000000"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="5be7489fadee1368f88cd717b43b", 0x0, 0xf000}, 0x28) 01:22:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2623.406434] audit: type=1400 audit(1575076953.900:386057): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.408249] audit: type=1400 audit(1575076953.900:386058): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:34 executing program 3: ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:34 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 2623.413731] audit: type=1400 audit(1575076953.900:386059): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2623.416272] audit: type=1400 audit(1575076953.910:386060): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.420385] audit: type=1400 audit(1575076953.910:386061): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.432056] audit: type=1400 audit(1575076953.920:386062): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.448594] audit: type=1400 audit(1575076953.940:386063): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.451307] audit: type=1400 audit(1575076953.940:386064): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2623.452650] audit: type=1400 audit(1575076953.940:386065): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2624.022136] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2624.083857] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:38 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:38 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) socket$inet(0x10, 0x2, 0x0) 01:22:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) read$FUSE(r1, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) 01:22:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) [ 2627.693042] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:38 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:38 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8943, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) [ 2628.199192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:38 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 2628.305126] audit_printk_skb: 1146 callbacks suppressed [ 2628.305135] audit: type=1400 audit(1575076958.790:386448): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.316045] audit: type=1400 audit(1575076958.810:386449): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.324541] audit: type=1400 audit(1575076958.810:386450): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.345715] audit: type=1400 audit(1575076958.830:386451): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.371301] audit: type=1400 audit(1575076958.860:386452): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.379294] audit: type=1400 audit(1575076958.870:386453): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.382589] audit: type=1400 audit(1575076958.870:386454): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.401768] audit: type=1400 audit(1575076958.890:386455): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.426320] audit: type=1400 audit(1575076958.920:386456): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.433970] audit: type=1400 audit(1575076958.920:386457): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2628.767409] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:41 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r35, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:22:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) 01:22:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) [ 2630.917989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:41 executing program 0: socket(0x28, 0x80002, 0x0) 01:22:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:41 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) socket$inet6(0xa, 0x80003, 0x6b) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:22:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2631.420563] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:42 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) r35 = socket$inet(0x10, 0x2, 0x0) sendmsg(r35, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:22:42 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:42 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000007f6111000000000000a0000000000000008dc2112943817cd55334e2e998f2c45eaf743cd54fdbdc1ecda612321a474b53c996ca472b9afb61db514d391349ab881254e485e7c7373dbe2990e5b3ad9a435dbe09e0d18677cedcd3423bad6149309195c97743a937cbc98a19473f4d2f869eff7285a6dac957e83b15e744"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:22:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, 0x0) 01:22:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2631.963582] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 01:22:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:42 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6b) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast1}, 0x80, 0x0}, 0x0) 01:22:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, 0x0) 01:22:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:42 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:43 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) socket$inet(0x10, 0x2, 0x0) 01:22:43 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}, [@call={0x161, 0x11, 0xa4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:22:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, 0x0) 01:22:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2f, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:43 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:43 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:22:43 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:43 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x3, 0x80000000000004) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0xff, 0x1}, 0x20) close(r1) 01:22:43 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2633.306954] audit_printk_skb: 2284 callbacks suppressed [ 2633.306962] audit: type=1400 audit(1575076963.800:387222): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:43 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000200000c0000000c0000000200000000000000621d000d04000074"], &(0x7f0000000080)=""/221, 0x24, 0xdd, 0x8}, 0x20) [ 2633.311709] audit: type=1400 audit(1575076963.800:387223): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.317247] audit: type=1400 audit(1575076963.810:387224): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.318994] audit: type=1400 audit(1575076963.810:387225): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.320681] audit: type=1400 audit(1575076963.810:387226): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.322318] audit: type=1400 audit(1575076963.810:387227): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.323990] audit: type=1400 audit(1575076963.810:387228): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.342081] audit: type=1400 audit(1575076963.830:387230): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.344129] audit: type=1400 audit(1575076963.830:387231): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2633.346696] audit: type=1400 audit(1575076963.840:387232): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:44 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c40)) 01:22:44 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000200)=0x54) 01:22:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:44 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 01:22:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x4, 0x0, 0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 01:22:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800}, [@call={0x161, 0x11, 0xa4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:22:44 executing program 5: r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x0, &(0x7f0000000400)={0x100000002, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:45 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:45 executing program 3: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000), 0x1c) dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000ac0)) 01:22:45 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) getgid() 01:22:47 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, 0x0, 0x0) 01:22:47 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r34 = getgid() fchownat(r31, &(0x7f0000000000)='./file0\x00', r33, r34, 0x400) 01:22:47 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x240900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020001) wait4(0x0, 0x0, 0x80000000, 0x0) 01:22:47 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @loopback}}) 01:22:47 executing program 5: socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff73, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 01:22:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) r1 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000201}) 01:22:47 executing program 0: r0 = socket(0x10, 0x400000803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ff00ffe90009144aff0ae9", 0x12, 0x0, 0x0, 0x0) 01:22:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, 0x0, 0x0) 01:22:48 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 01:22:48 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="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"/326], 0x0) 01:22:51 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, 0x0, 0x0) 01:22:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) r1 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000201}) 01:22:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 01:22:51 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() 01:22:51 executing program 0: mknod(&(0x7f00000000c0)='.\x00', 0x0, 0x0) [ 2640.528660] audit_printk_skb: 2327 callbacks suppressed [ 2640.528669] audit: type=1400 audit(1575076971.020:388008): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = creat(0x0, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000001d00)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/375], 0x0, 0x7c, 0xb9}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r2, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 01:22:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 01:22:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2640.641700] audit: type=1400 audit(1575076971.130:388009): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) r1 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000201}) [ 2640.651292] audit: type=1400 audit(1575076971.140:388010): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.652783] audit: type=1400 audit(1575076971.140:388011): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 01:22:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) [ 2640.653104] audit: type=1400 audit(1575076971.140:388012): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.675409] audit: type=1400 audit(1575076971.160:388013): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.677527] audit: type=1400 audit(1575076971.170:388014): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.678491] audit: type=1400 audit(1575076971.170:388015): avc: denied { net_admin } for pid=29194 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.682537] audit: type=1400 audit(1575076971.170:388017): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2640.684287] audit: type=1400 audit(1575076971.170:388016): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:55 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) r1 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000201}) 01:22:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 01:22:55 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r32, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:22:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000400)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty=0xac1414bb}}}, 0x108) 01:22:55 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x0) 01:22:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) 01:22:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 01:22:55 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 01:22:55 executing program 3: symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, r3+30000000}}, 0x0) readv(r1, &(0x7f000058c000)=[{&(0x7f0000422f69)=""/151, 0x97}], 0x10000000000001f4) dup3(r0, r1, 0x0) tkill(r2, 0x5000000000014) 01:22:55 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 01:22:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba719fdffee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a08594e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084dc1840039649673b73383b727e127c6a36da871a86cc8c8dda850000000002000100000000000000070080ffffff05000500000000000a000000de7af7bd3e10c05ce0099e088c374525b1f361d6c7358f000099c39c"], 0xd8}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmmsg(r3, &(0x7f0000000180), 0x400006a, 0x0) [ 2645.538962] audit_printk_skb: 1257 callbacks suppressed [ 2645.538973] audit: type=1400 audit(1575076976.030:388439): avc: denied { dac_override } for pid=29255 comm="syz-executor.0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.542299] audit: type=1400 audit(1575076976.030:388440): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.552790] audit: type=1400 audit(1575076976.030:388441): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.561407] audit: type=1400 audit(1575076976.030:388442): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.569944] audit: type=1400 audit(1575076976.030:388443): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.572115] audit: type=1400 audit(1575076976.060:388444): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.577311] audit: type=1400 audit(1575076976.070:388445): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.579358] audit: type=1400 audit(1575076976.070:388446): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.581191] audit: type=1400 audit(1575076976.070:388447): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2645.585460] audit: type=1400 audit(1575076976.070:388448): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:22:58 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) 01:22:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:22:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0xff, 0xffff0bf5}]}, 0x10) 01:22:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 01:22:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') read$eventfd(r0, 0x0, 0x0) 01:22:58 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r31, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) 01:22:58 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 01:22:58 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:22:58 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000200)='GPLem0\x00') 01:22:58 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x0, 0x0) 01:22:59 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 01:22:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @random="3341b2dc8432"}, 0x9, {0x2, 0x0, @remote}, 'veth1_to_team\x00'}) 01:22:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:01 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:01 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) r32 = socket$inet(0x10, 0x2, 0x0) sendmsg(r32, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:23:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x180) 01:23:01 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) [ 2651.332475] audit_printk_skb: 1332 callbacks suppressed [ 2651.332484] audit: type=1400 audit(1575076981.820:388894): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) [ 2651.465874] audit: type=1400 audit(1575076981.950:388895): avc: denied { sys_admin } for pid=29307 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) 01:23:02 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) [ 2651.467237] audit: type=1400 audit(1575076981.960:388896): avc: denied { sys_admin } for pid=29307 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2651.471955] audit: type=1400 audit(1575076981.960:388897): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:02 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) [ 2651.473644] audit: type=1400 audit(1575076981.960:388898): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x9, 0x0) [ 2651.483612] audit: type=1400 audit(1575076981.970:388899): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2651.492664] audit: type=1400 audit(1575076981.980:388900): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2651.503007] audit: type=1400 audit(1575076981.990:388901): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2651.504872] audit: type=1400 audit(1575076981.990:388902): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2651.529975] audit: type=1400 audit(1575076982.020:388903): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:03 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="230000000000000008001b0000000000"], 0x28}}, 0x0) 01:23:03 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) socket$inet(0x10, 0x2, 0x0) 01:23:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) 01:23:03 executing program 4: lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) 01:23:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:03 executing program 0: syz_emit_ethernet(0x68, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast}, @gre={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x6e4]}}}}}}, 0x0) 01:23:03 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:03 executing program 4: lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:03 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 01:23:03 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:03 executing program 0: ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x16) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$sock_ifreq(r1, 0x8922, &(0x7f00000003c0)={'veth0\x00', @ifru_addrs=@tipc}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) 01:23:03 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) 01:23:03 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:04 executing program 4: lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 01:23:04 executing program 3: mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:04 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, 0x0, &(0x7f0000000380)) 01:23:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:04 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 01:23:04 executing program 3: mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:04 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:05 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) r31 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r31, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb1", 0x0}, 0x20) 01:23:05 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:05 executing program 3: mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:05 executing program 0: r0 = socket$inet(0x10, 0x80003, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f00000003c0)={'veth0\x00', @ifru_addrs=@tipc}) 01:23:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004", 0x39}], 0x1}, 0x0) 01:23:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(r0, 0x9, 0x0) 01:23:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004", 0x39}], 0x1}, 0x0) 01:23:05 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x2, &(0x7f0000001180), 0xd4, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 01:23:05 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:05 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004", 0x39}], 0x1}, 0x0) 01:23:05 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) 01:23:06 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(0x0, 0x0) 01:23:06 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d82", 0x43}], 0x1}, 0x0) 01:23:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(0xffffffffffffffff, 0x9, 0x0) 01:23:06 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 01:23:06 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d82", 0x43}], 0x1}, 0x0) [ 2656.336635] audit_printk_skb: 3465 callbacks suppressed [ 2656.336643] audit: type=1400 audit(1575076986.830:390059): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.348412] audit: type=1400 audit(1575076986.830:390060): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.356828] audit: type=1400 audit(1575076986.830:390061): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.364586] audit: type=1400 audit(1575076986.830:390062): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.373073] audit: type=1400 audit(1575076986.860:390063): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.376898] audit: type=1400 audit(1575076986.870:390064): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.378863] audit: type=1400 audit(1575076986.870:390065): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.381001] audit: type=1400 audit(1575076986.870:390066): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.381868] audit: type=1400 audit(1575076986.870:390067): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2656.382852] audit: type=1400 audit(1575076986.870:390068): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:09 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x0, 0x0) 01:23:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d82", 0x43}], 0x1}, 0x0) 01:23:09 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x33) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x19404, 0x0) 01:23:09 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, r27, 0x0, 0xe, &(0x7f0000000bc0)='md5sum{cgroup\x00', 0xffffffffffffffff}, 0x30) 01:23:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x0, 0x0) 01:23:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 01:23:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) lseek(r0, 0x0, 0x0) 01:23:09 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 01:23:09 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000280)={'dummy0\x00', @ifru_mtu}) 01:23:12 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 01:23:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) close(r0) 01:23:12 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r30 = getgid() fchownat(r27, &(0x7f0000000000)='./file0\x00', r29, r30, 0x400) 01:23:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) [ 2661.722025] audit_printk_skb: 1442 callbacks suppressed [ 2661.722034] audit: type=1400 audit(1575076992.210:390550): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:12 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 01:23:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) 01:23:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:12 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) [ 2661.839676] audit: type=1400 audit(1575076992.330:390551): avc: denied { map_create } for pid=29513 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2661.842577] audit: type=1400 audit(1575076992.330:390552): avc: denied { net_admin } for pid=29510 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2661.848132] audit: type=1400 audit(1575076992.340:390553): avc: denied { map_create } for pid=29513 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 01:23:12 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x4c, 0x0, &(0x7f0000000200)) [ 2661.863361] audit: type=1400 audit(1575076992.350:390554): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f0000000180)) [ 2661.868019] audit: type=1400 audit(1575076992.360:390555): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2661.873831] audit: type=1400 audit(1575076992.360:390556): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2661.875759] audit: type=1400 audit(1575076992.360:390557): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2661.877807] audit: type=1400 audit(1575076992.370:390558): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2661.879664] audit: type=1400 audit(1575076992.370:390559): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 01:23:16 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() 01:23:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x29, 0x0, &(0x7f0000000180)) 01:23:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:16 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', 0x0, 0x0, 0x0) utimes(&(0x7f0000000100)='./file0\x00', 0x0) 01:23:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7ef", 0x4a}], 0x1}, 0x0) 01:23:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:16 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(0x0, 0x0) 01:23:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x26, 0x0, &(0x7f0000000180)) 01:23:16 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 01:23:16 executing program 0: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) [ 2666.727365] audit_printk_skb: 1398 callbacks suppressed [ 2666.727373] audit: type=1400 audit(1575076997.210:391025): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.732410] audit: type=1400 audit(1575076997.220:391027): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.739514] audit: type=1400 audit(1575076997.220:391028): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.747214] audit: type=1400 audit(1575076997.240:391029): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.748839] audit: type=1400 audit(1575076997.240:391030): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.751891] audit: type=1400 audit(1575076997.240:391031): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.757033] audit: type=1400 audit(1575076997.250:391032): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.758814] audit: type=1400 audit(1575076997.250:391033): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.760500] audit: type=1400 audit(1575076997.250:391034): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2666.762134] audit: type=1400 audit(1575076997.250:391035): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:19 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(0x0, 0x0) 01:23:19 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)) 01:23:19 executing program 0: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:19 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r28, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:23:19 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 01:23:19 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf", 0x4b}], 0x1}, 0x0) 01:23:19 executing program 0: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) utimes(0x0, 0x0) 01:23:19 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x43, 0x0, &(0x7f0000000200)) 01:23:20 executing program 5: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket(0x10, 0x803, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002e0009a60000009ce80000e0ff000000", @ANYRES32=r3], 0x2}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 01:23:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:22 executing program 3: 01:23:22 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000004a009b8814e5f407000904000a", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 01:23:22 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r27, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) 01:23:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) 01:23:22 executing program 5: [ 2672.343179] audit_printk_skb: 1041 callbacks suppressed [ 2672.343187] audit: type=1400 audit(1575077002.830:391383): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:22 executing program 3: 01:23:22 executing program 5: 01:23:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x27, 0x0, &(0x7f0000000180)) [ 2672.450705] audit: type=1400 audit(1575077002.940:391384): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.459941] audit: type=1400 audit(1575077002.950:391385): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.461603] audit: type=1400 audit(1575077002.950:391386): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 01:23:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 01:23:23 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r28 = socket$inet(0x10, 0x2, 0x0) sendmsg(r28, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) [ 2672.480369] audit: type=1400 audit(1575077002.970:391388): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.489422] audit: type=1400 audit(1575077002.960:391387): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.491028] audit: type=1400 audit(1575077002.980:391389): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.497214] audit: type=1400 audit(1575077002.990:391390): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.513131] audit: type=1400 audit(1575077003.000:391391): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.517857] audit: type=1400 audit(1575077003.010:391392): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2672.559922] selinux_nlmsg_perm: 70 callbacks suppressed [ 2672.559933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.559987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560041] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560094] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560193] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560343] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 [ 2672.560393] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=29620 comm=syz-executor.4 01:23:24 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000180)) 01:23:24 executing program 4: 01:23:24 executing program 3: 01:23:24 executing program 4: 01:23:24 executing program 3: 01:23:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000180)) 01:23:24 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) socket$inet(0x10, 0x2, 0x0) 01:23:24 executing program 5: 01:23:24 executing program 4: 01:23:24 executing program 3: 01:23:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, &(0x7f0000000180)) 01:23:27 executing program 4: 01:23:27 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:27 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) r27 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r27, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) 01:23:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, 0x0) 01:23:27 executing program 3: 01:23:27 executing program 5: 01:23:27 executing program 3: 01:23:27 executing program 4: 01:23:27 executing program 5: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec4, 0x6) 01:23:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, 0x0) 01:23:27 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2677.353304] audit_printk_skb: 1863 callbacks suppressed 01:23:27 executing program 4: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc50aaa17134b256e8a8ce50c74ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d61043c3c299e241aa7c3d71184549a2418c481a00dcc176f1717cd642efa96107bf1006ec02d96ad13c7077822a193d1f4325a3bb5a07daea2272bb7125d55d7e60f9e5fb153bf1c9204546d0059938040d7ee641d44f56aafd308dfbc3becab1", @ANYRES32, @ANYRES16, @ANYPTR64, @ANYRES32, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a079"], 0x0, 0x150}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2677.353314] audit: type=1400 audit(1575077007.840:392016): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:27 executing program 3: [ 2677.353834] audit: type=1400 audit(1575077007.840:392015): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:28 executing program 5: [ 2677.357828] audit: type=1400 audit(1575077007.850:392017): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2677.366785] audit: type=1400 audit(1575077007.860:392018): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:28 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) syz_open_procfs(0x0, 0x0) [ 2677.368662] audit: type=1400 audit(1575077007.860:392019): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:28 executing program 3: 01:23:28 executing program 4: 01:23:28 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c55402585cb61a7c3c73288d0c0cd1acf4d28b4deddc956f04ad009f58880e3c692df05c0a81b8da611e59633620ab9356bd39771fa4d832beac2531e889c1ab1ad9c55a5ff6ed2307416996b2851f0e573c801c8beb94daa5b1a926e07636023dc50b7ccd861ff35e6e535c03447016a34055ea3cba6afcb838aa6977d6e328d6f0a0ea743967062abce3c8edfe919f5f4b1cd53521deb38844fafb23f91deb257a0bfd650ba0be993eec385f6812fd75dd1b"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 2677.370790] audit: type=1400 audit(1575077007.860:392020): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2677.372601] audit: type=1400 audit(1575077007.860:392021): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2677.374518] audit: type=1400 audit(1575077007.860:392022): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2677.382672] audit: type=1400 audit(1575077007.870:392023): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() ptrace$cont(0x18, r0, 0x0, 0x0) 01:23:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9389a5eb4888101a3639d110c100804f", 0x10) close(r0) [ 2677.412453] audit: type=1400 audit(1575077007.900:392024): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:28 executing program 5: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x2, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfe}}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x5) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0xb309a17e871cc587}, 0x14}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000340)) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', 0x0, 0x0, 0x7) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f52972", 0x14}, {&(0x7f0000001c40)}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b5", 0x40}, {0x0}, {0x0}, {&(0x7f0000000f40)="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", 0x322}], 0x4}}], 0x2, 0x80) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) 01:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x27, 0x0, 0x0) 01:23:31 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fallocate(r1, 0x4000000000000010, 0x2, 0x7fff) 01:23:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00fb7f00068da8da2e77ab9c998a8ef8b34244a45f8da97569a67a97ba909ebddac701a1fae10980b0a2882ae6fd518d293dc36cbfe1a78dafb2e7e5942e77efb67596d284102f31603f310184cd8ee4e5bd185c6e60f53df295fb7f045690d7a2837db198298913923662f21332a7f74a00"/127], 0x7f, 0x4) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x0) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000007, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setreuid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000740)=ANY=[@ANYPTR], 0x8) 01:23:31 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000100)={0x30, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x12, 'vmnet0cpusetcgroup'}}, 0x30) 01:23:31 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) 01:23:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:31 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB="66696c74657200000000000000000000000011000000000000000000000004000060010001680200c2619f535a09010400000000000003000003669055e9412322b3b33ea4030000a4030000a4030000a403000004"], 0x1) 01:23:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) 01:23:31 executing program 4: syz_emit_ethernet(0x16, &(0x7f0000000000)={@link_local, @dev, [], {@llc={0x4, {@snap={0x0, 0x0, "d0", "1670b5"}}}}}, 0x0) 01:23:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f00000000c0)) 01:23:34 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:34 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:23:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000415fc8)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in=@dev, @in=@multicast2}, {@in=@loopback, 0x0, 0x33}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) 01:23:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r0, r1) 01:23:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2683.940252] audit_printk_skb: 1942 callbacks suppressed [ 2683.940260] audit: type=1400 audit(1575077014.430:392673): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:34 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r3, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000380)="05", 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) dup3(r1, r2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) [ 2684.082119] audit: type=1400 audit(1575077014.570:392674): avc: denied { net_admin } for pid=29776 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.106057] audit: type=1400 audit(1575077014.600:392675): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.109773] audit: type=1400 audit(1575077014.600:392676): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.115275] audit: type=1400 audit(1575077014.600:392677): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.134157] audit: type=1400 audit(1575077014.620:392678): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.171621] audit: type=1400 audit(1575077014.660:392679): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.180954] audit: type=1400 audit(1575077014.670:392680): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.187076] audit: type=1400 audit(1575077014.680:392681): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2684.192499] audit: type=1400 audit(1575077014.680:392682): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:35 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='locpusetwlan0lo\x00'}, 0x10) 01:23:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) close(r0) 01:23:38 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:38 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r26 = getgid() fchownat(r23, &(0x7f0000000000)='./file0\x00', r25, r26, 0x400) 01:23:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:38 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000480)=""/186, 0x50}, 0x120) [ 2688.258177] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.275625] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 01:23:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2688.326833] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 01:23:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2688.377160] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 01:23:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2688.463762] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.507379] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.548471] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.575610] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.618306] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.657649] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.715648] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.722653] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.752325] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 01:23:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2688.787189] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.823683] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.866518] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.896447] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2688.948367] audit_printk_skb: 1194 callbacks suppressed 01:23:39 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() [ 2688.948382] audit: type=1400 audit(1575077019.430:393081): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2688.951158] audit: type=1400 audit(1575077019.440:393082): avc: denied { net_admin } for pid=29837 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.027347] audit: type=1400 audit(1575077019.520:393083): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.029293] audit: type=1400 audit(1575077019.520:393084): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.032023] audit: type=1400 audit(1575077019.520:393085): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.033950] audit: type=1400 audit(1575077019.520:393086): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.036367] audit: type=1400 audit(1575077019.520:393087): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.051864] audit: type=1400 audit(1575077019.540:393088): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.087071] audit: type=1400 audit(1575077019.580:393091): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2689.089004] audit: type=1400 audit(1575077019.580:393092): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2690.000836] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.010761] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.019706] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.028676] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.035383] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.044653] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.053709] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.062806] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.071752] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.080709] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.089691] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.098575] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.105301] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.114328] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.123303] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.132295] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.140534] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.147429] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.154235] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.161211] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.167942] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.174642] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.181368] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.188099] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.194935] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.202530] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.209312] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.216038] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.222808] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.229543] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.236267] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.242967] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.249692] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.256414] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.263577] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.270324] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.277029] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.283726] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.290451] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.297187] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.303927] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.310666] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.317375] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.324064] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.330790] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.337506] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.347515] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.356847] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.363585] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.371802] hid-generic 0000:0000:0000.001F: unknown main item tag 0x7 [ 2690.380091] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.388310] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.397616] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.404326] hid-generic 0000:0000:0000.001F: unknown main item tag 0x7 [ 2690.412566] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.420810] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.429036] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.438783] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.449491] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.459525] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 [ 2690.475327] hid-generic 0000:0000:0000.001F: hidraw1: HID v0.00 Device [syz0] on syz0 [ 2690.499817] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.513185] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.523734] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.533751] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.544518] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.553093] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.563145] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.573104] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.591621] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.622534] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.636488] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.664988] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.688986] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.713395] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.723572] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.734970] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.743909] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.753880] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.765250] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.774370] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.784926] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.795139] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.802259] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.809033] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.815800] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.822692] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.830891] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.838731] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.845453] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.852289] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.859089] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.865807] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.872518] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.879235] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.885970] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.892818] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.899539] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.906263] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.913498] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.920217] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.926954] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.933642] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.940394] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.947098] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.953873] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.960584] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.967306] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.973996] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.980724] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.987601] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2690.994284] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.001001] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.007716] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.014407] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.021121] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.027917] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.034611] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.041329] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.048136] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.054802] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.061520] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.069723] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.076537] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.083238] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.089967] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.096684] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.103367] hid-generic 0000:0000:0000.0020: unknown main item tag 0x7 [ 2691.110068] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.116832] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.123537] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.130271] hid-generic 0000:0000:0000.0020: unknown main item tag 0x7 [ 2691.137005] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.143713] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.150669] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.157420] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.164097] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.170825] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 [ 2691.179034] hid-generic 0000:0000:0000.0020: hidraw1: HID v0.00 Device [syz0] on syz0 01:23:42 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:42 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r24, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:23:42 executing program 4: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00') symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file0\x00') 01:23:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:42 executing program 4: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00') symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file0\x00') 01:23:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:45 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:45 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r24 = socket$inet(0x10, 0x2, 0x0) sendmsg(r24, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:23:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:45 executing program 4: open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 2694.937845] audit_printk_skb: 1368 callbacks suppressed [ 2694.937855] audit: type=1400 audit(1575077025.430:393548): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:45 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x1fffff, 0x0, 0x11, r0, 0x0) [ 2695.040559] audit: type=1400 audit(1575077025.530:393549): avc: denied { net_admin } for pid=29910 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.046784] audit: type=1400 audit(1575077025.530:393550): avc: denied { net_admin } for pid=29910 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.048294] audit: type=1400 audit(1575077025.540:393551): avc: denied { net_admin } for pid=29910 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2695.054916] audit: type=1400 audit(1575077025.540:393552): avc: denied { net_admin } for pid=29910 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.064132] audit: type=1400 audit(1575077025.550:393553): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.076899] audit: type=1400 audit(1575077025.570:393554): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.078568] audit: type=1400 audit(1575077025.570:393555): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.083488] audit: type=1400 audit(1575077025.570:393556): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2695.089639] audit: type=1400 audit(1575077025.580:393557): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:49 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) socket$inet(0x10, 0x2, 0x0) 01:23:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)) 01:23:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:49 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:49 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2699.192941] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 01:23:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:50 executing program 0: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2699.671099] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 01:23:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:50 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2699.948846] audit_printk_skb: 1301 callbacks suppressed [ 2699.948854] audit: type=1400 audit(1575077030.430:393990): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2699.953447] audit: type=1400 audit(1575077030.440:393993): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2699.956812] audit: type=1400 audit(1575077030.450:393994): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)) 01:23:50 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) r23 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r23, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) 01:23:50 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:50 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2699.964688] audit: type=1400 audit(1575077030.450:393995): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2699.966363] audit: type=1400 audit(1575077030.450:393996): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:51 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2699.977420] audit: type=1400 audit(1575077030.450:393997): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:51 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2699.988210] audit: type=1400 audit(1575077030.480:393998): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2699.998176] audit: type=1400 audit(1575077030.480:393999): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2700.001257] audit: type=1400 audit(1575077030.490:394000): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2700.003215] audit: type=1400 audit(1575077030.490:394001): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2700.099991] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 01:23:51 executing program 3: socket$netlink(0x10, 0x3, 0x8000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:23:51 executing program 0: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:53 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000140)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)) 01:23:53 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) syz_open_procfs(0x0, 0x0) 01:23:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 01:23:53 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 01:23:53 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:53 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, 0x0, 0x0) 01:23:53 executing program 0: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:54 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r22 = getgid() fchownat(r19, &(0x7f0000000000)='./file0\x00', r21, r22, 0x400) 01:23:56 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140), 0x0) 01:23:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)) 01:23:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:56 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() [ 2706.097186] audit_printk_skb: 1686 callbacks suppressed [ 2706.097195] audit: type=1400 audit(1575077036.590:394564): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140), 0x0) 01:23:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2706.201894] audit: type=1400 audit(1575077036.690:394565): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140), 0x0) [ 2706.203809] audit: type=1400 audit(1575077036.690:394566): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2706.225152] audit: type=1400 audit(1575077036.710:394567): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2706.236632] audit: type=1400 audit(1575077036.730:394568): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2706.244588] audit: type=1400 audit(1575077036.730:394569): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2706.246323] audit: type=1400 audit(1575077036.740:394570): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2706.248155] audit: type=1400 audit(1575077036.740:394571): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2706.249799] audit: type=1400 audit(1575077036.740:394572): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2706.251512] audit: type=1400 audit(1575077036.740:394573): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:23:57 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) 01:23:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 01:23:57 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) r20 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) getsockopt$inet_IP_XFRM_POLICY(r20, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:23:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 01:23:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:58 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 01:23:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 01:23:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) syz_open_pts(r1, 0x0) 01:23:58 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) accept4(0xffffffffffffffff, &(0x7f0000000e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x80, 0x800) 01:23:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)}], 0x1) 01:23:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:23:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:23:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)}], 0x1) 01:23:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:24:01 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 01:24:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)}], 0x1) 01:24:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:24:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) 01:24:01 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) ioctl$PPPIOCGNPMODE(r19, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) [ 2711.196826] audit_printk_skb: 2162 callbacks suppressed [ 2711.196835] audit: type=1400 audit(1575077041.690:395296): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff03", 0x2c}], 0x1) 01:24:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2711.341104] audit: type=1400 audit(1575077041.820:395297): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.348774] audit: type=1400 audit(1575077041.830:395298): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.350470] audit: type=1400 audit(1575077041.830:395299): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff03", 0x2c}], 0x1) [ 2711.355376] audit: type=1400 audit(1575077041.830:395300): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2711.360001] audit: type=1400 audit(1575077041.830:395301): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.361626] audit: type=1400 audit(1575077041.830:395302): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.377477] audit: type=1400 audit(1575077041.870:395303): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.380581] audit: type=1400 audit(1575077041.870:395304): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2711.380626] audit: type=1400 audit(1575077041.870:395305): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:05 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 01:24:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:05 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) r19 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r19, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) 01:24:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) 01:24:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff03", 0x2c}], 0x1) 01:24:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:24:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300", 0x42}], 0x1) 01:24:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xbb8) 01:24:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xbb8) 01:24:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300", 0x42}], 0x1) 01:24:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2716.211490] audit_printk_skb: 1197 callbacks suppressed [ 2716.211499] audit: type=1400 audit(1575077046.700:395706): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.213873] audit: type=1400 audit(1575077046.700:395707): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.223441] audit: type=1400 audit(1575077046.710:395708): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.231512] audit: type=1400 audit(1575077046.720:395709): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.241892] audit: type=1400 audit(1575077046.730:395710): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.257078] audit: type=1400 audit(1575077046.750:395711): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.262260] audit: type=1400 audit(1575077046.750:395712): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.267684] audit: type=1400 audit(1575077046.760:395713): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.274299] audit: type=1400 audit(1575077046.760:395714): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2716.280015] audit: type=1400 audit(1575077046.770:395715): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:09 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 01:24:09 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) syz_open_procfs(0x0, 0x0) 01:24:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000002c0)=0x3) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) 01:24:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0xbb8) 01:24:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300", 0x42}], 0x1) 01:24:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a", 0x4d}], 0x1) 01:24:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) 01:24:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 01:24:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a", 0x4d}], 0x1) 01:24:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) 01:24:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a", 0x4d}], 0x1) 01:24:12 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 01:24:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 01:24:12 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) getsockopt$inet6_IPV6_XFRM_POLICY(r15, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000a40)=0xef2fedc5c6f230c2) 01:24:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) 01:24:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2722.072671] audit_printk_skb: 1173 callbacks suppressed 01:24:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000", 0x53}], 0x1) 01:24:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v'}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2722.072680] audit: type=1400 audit(1575077052.560:396107): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:12 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 01:24:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) [ 2722.131966] audit: type=1400 audit(1575077052.620:396108): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.133626] audit: type=1400 audit(1575077052.620:396109): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000", 0x53}], 0x1) 01:24:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2722.148828] audit: type=1400 audit(1575077052.640:396110): avc: denied { net_admin } for pid=30277 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) [ 2722.153450] audit: type=1400 audit(1575077052.640:396111): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.171953] audit: type=1400 audit(1575077052.660:396112): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.173806] audit: type=1400 audit(1575077052.660:396113): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.181831] audit: type=1400 audit(1575077052.670:396114): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.183747] audit: type=1400 audit(1575077052.670:396115): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2722.191065] audit: type=1400 audit(1575077052.680:396117): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:16 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 01:24:16 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r18 = getgid() fchownat(r15, &(0x7f0000000000)='./file0\x00', r17, r18, 0x400) 01:24:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000", 0x53}], 0x1) 01:24:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) 01:24:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:16 executing program 5: r0 = memfd_create(&(0x7f0000000200)='pp\x8e1&\xf7\x97\x96\xef\x85\xce\x8a\x98\x82^&\xceK\x00\xe8#bd\b@\t\xe0R\x1d[\xac\x874\xc0\xf6\xde\xf4H\xa8\xb7\r\x85\xc8\xaf\x87\x1b\xdb\xe9O\x8ft\xbb\x0e', 0x0) fallocate(r0, 0x3, 0x0, 0x80000001) 01:24:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000000000", 0x56}], 0x1) 01:24:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) 01:24:17 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 01:24:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000000000", 0x56}], 0x1) 01:24:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) [ 2727.075775] audit_printk_skb: 1227 callbacks suppressed [ 2727.075783] audit: type=1400 audit(1575077057.560:396526): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.094081] audit: type=1400 audit(1575077057.580:396527): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.104871] audit: type=1400 audit(1575077057.590:396529): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.106961] audit: type=1400 audit(1575077057.600:396530): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.107075] audit: type=1400 audit(1575077057.590:396528): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.117626] audit: type=1400 audit(1575077057.610:396531): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.119532] audit: type=1400 audit(1575077057.610:396532): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.121348] audit: type=1400 audit(1575077057.610:396533): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.123035] audit: type=1400 audit(1575077057.610:396534): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2727.124743] audit: type=1400 audit(1575077057.610:396535): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:20 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) 01:24:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) 01:24:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000480)='bridge0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r2, r4, 0x100000) ioctl$EVIOCGKEYCODE(r5, 0x80084504, &(0x7f0000000380)=""/212) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) chown(&(0x7f0000000140)='./file0\x00', r7, r8) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000080)={@ipv4={[], [], @broadcast}, 0x7d}) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r10, 0x8919, &(0x7f00000004c0)={'veth1\x00', {0x2, 0x4e23, @remote}}) 01:24:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c1000030000000000", 0x56}], 0x1) 01:24:20 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() 01:24:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) 01:24:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 01:24:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c100003000000000000", 0x57}], 0x1) 01:24:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f00000022c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) 01:24:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 01:24:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c100003000000000000", 0x57}], 0x1) 01:24:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c100003000000000000", 0x57}], 0x1) 01:24:23 executing program 2: syz_emit_ethernet(0x6e, &(0x7f0000000440)={@link_local={0x1, 0x80, 0xc2, 0x40000000, 0x689}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x38, 0x88, 0x0, @remote={0xfe, 0x80, [0x2, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x8dffffff00000000, 0xfe03, 0x0, 0xfffffff5, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[@hopopts], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "b68cd4", 0x0, 0x0, 0x0, @mcast1, @loopback}}}}}}}, 0x0) 01:24:23 executing program 5: sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) getsockopt(0xffffffffffffffff, 0xffffbfff, 0x8, &(0x7f0000000440)=""/220, 0x0) read(0xffffffffffffffff, &(0x7f0000000040)=""/11, 0xb) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket(0x0, 0x3, 0xc) write(r2, &(0x7f0000000340)="1f0000000104ff40003b54c00711", 0xe) r3 = socket(0x1000000010, 0x3, 0x0) dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f'}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, 0x36}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) pselect6(0xc, &(0x7f00000000c0)={0x0, 0x0, 0x5}, 0x0, &(0x7f0000000140)={0x1b4, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:24:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) 01:24:23 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:24:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) [ 2732.934880] audit_printk_skb: 1215 callbacks suppressed [ 2732.934888] audit: type=1400 audit(1575077063.420:396941): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x50}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:24:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, 0x0) [ 2733.054758] audit: type=1400 audit(1575077063.540:396942): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) [ 2733.067902] audit: type=1400 audit(1575077063.560:396943): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2733.072931] audit: type=1400 audit(1575077063.560:396944): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:23 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="00100000000000008901"], 0xa) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") close(r2) socket$netlink(0x10, 0x3, 0x4) write(0xffffffffffffffff, &(0x7f0000000080)="fc0000001c000725ab0925000900070007ab08000800000081006193210001c000000001000000000000000000039815fa2c1ec28656aaa79bb94b467e0000000a000200035a0201856c256f1a272fdf0d11512f3cadd44000000000008934d05cd3f3187a617cd5000000000000002c05defd5a32e2ab8207000000ec18444ef92e475bba4a463ae4f5566f91cf190201ded815b2ccd243fa7ded94e0ad91bd0734ba3fcd8a57d47689cd3dd16b17e583df150c3b880f411f46a60467b4d5715587", 0xc2) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce69", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 2733.101557] audit: type=1400 audit(1575077063.590:396945): avc: denied { sys_admin } for pid=2080 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) 01:24:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}, [@call={0x161, 0x11, 0xa4, 0xf}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2733.111821] audit: type=1400 audit(1575077063.600:396946): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2733.119837] audit: type=1400 audit(1575077063.610:396947): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2733.126082] audit: type=1400 audit(1575077063.620:396948): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:24 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r15, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) 01:24:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) 01:24:24 executing program 0: socketpair(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 2733.127938] audit: type=1400 audit(1575077063.620:396949): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) [ 2733.132303] audit: type=1400 audit(1575077063.620:396950): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000780)={&(0x7f0000000400)=@kern={0x10, 0x0, 0x0, 0x4010080}, 0xc, &(0x7f0000000740)=[{&(0x7f0000004d40)={0xd04, 0x0, 0x0, 0x0, 0x0, "", [@generic="dd89fc8bd75facafac12ef9eaffa2594915cd0f3a1a6f6af91d96791d7cad3ae22ee9e33ae33021077", @nested={0xcc8, 0x0, [@generic="0cbd17c149eeaff0dcc9c080022401a39c00a0b481565b716c9a21572afbdeecd785f7f95c4220c907dab51c9c883228aeb28fbca0d4f7e687fb75ca9aeb65233eda23e0551a85fef80d8b4bb7190d008c4df4a48e493b49f64fdb50c125f5f6e687f9022f4fe28fa1e80ddf93f266a74a2b50a1e0aee582381e6e6e3a8c9b95b5942f1caea64261", @generic="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"]}]}, 0xd04}], 0x1}, 0x0) [ 2734.138063] selinux_nlmsg_perm: 69 callbacks suppressed [ 2734.138073] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.138135] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.138189] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.138243] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.139054] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.139110] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.139165] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.139221] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.139275] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 [ 2734.140161] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=30410 comm=syz-executor.3 01:24:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000080)=0x4) 01:24:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x5, 0x5, 0xe009}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) socket(0x0, 0x0, 0x0) 01:24:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x3c) 01:24:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4870000000000000480000000000000095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13050000000000000026fb0b71d0e6adfefc41d86bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc1626e3a2a2ad35806150ae0209e62f51ee988e6e0dc8ce974a22a550bdfd70800c86ae3b3e05df3ceb9fc464c2a100c788b277beee1cbf9b0a4def23d410f6296b32a8343881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f597eba9ffab3e05379e5aeb0597a13b3e22278d00031e5388ee5c867ddd58211d4ececb0cd2b6d357b8580218ce740068725837074e468ee23fcf49822775985bf31b715f5888b2153052ccb1a78a8b2b8c6ef48a71201ce3c601db96fe1a90374b8f883a2db630e0af6e80187cbebd5bbd6208bc064baef219787e784c3b12011ae7cd2b75614b4e9373fcf51814d5d4d3527268f50ce374341e30bc2400f8d1ef6358410c93e83d6536e43cc941f2102666d4c415a52e1b0866cf541dde3217e14531cfb7df6594b4b056358ab807dd0f5c84fbe550f97168660aa6da2fb008a76bde511a974fabb5fbc50bdd02a390e0922edef93ed7ecbe09666f61b8bd31df5326ce7218b73653e91f9f8c0000007548e5f83874dff41119430ae77c7441e71bb9307a3dafb12f2611ad360de54e480f9f4cf018aaafb4be34275c2f253321577fb043fae52142f06803cec4d7d5f2d53eb18eee0338516f9cc529d0bd0b4380c2b959e47ee5000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="03268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 01:24:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) 01:24:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x4) 01:24:25 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) r16 = socket$inet(0x10, 0x2, 0x0) sendmsg(r16, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f6105000200", 0x12}], 0x1}, 0x0) 01:24:25 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x8) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x7, 0x0, 0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 01:24:25 executing program 0: 01:24:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x4) 01:24:25 executing program 5: 01:24:26 executing program 3: 01:24:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x6c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:24:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x4) 01:24:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x30}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:24:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @random="a54d1155e258"}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'}) 01:24:26 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) socket$inet(0x10, 0x2, 0x0) 01:24:26 executing program 3: 01:24:26 executing program 0: 01:24:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:26 executing program 5: 01:24:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) 01:24:26 executing program 0: 01:24:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) 01:24:27 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:27 executing program 5: 01:24:27 executing program 3: 01:24:27 executing program 0: 01:24:28 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) r15 = syz_open_procfs(0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r15, &(0x7f0000000400)="afdb706b1730e6bc9ad878a02fd9c6339933ac93f263af020eb15fb8a7d2bfe01008c08f2e1e8bf0143ab1cbc3f84c7eb16aea23a86f6eb9adae3978964c8e9254", 0x0}, 0x20) 01:24:28 executing program 5: 01:24:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, 0x0) 01:24:28 executing program 3: 01:24:28 executing program 0: 01:24:28 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:28 executing program 0: 01:24:28 executing program 5: 01:24:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) read(r0, &(0x7f0000000000)=""/173, 0xad) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000013) 01:24:28 executing program 2: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)) 01:24:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r3 = creat(&(0x7f0000000100)='./bus\x00', 0x256) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2008001) dup3(r4, r3, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000), 0x200a00}]) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x5, 0x8f, &(0x7f0000000280)="25b8868d509055fd157eaf64ac87f1f142e407a0413805abb0e6e80fd3ea2138b2b103af01923739b48198c8ba40480866c409e2c9fccfbf72d2e2b96a4e7ffca1e0650c108a163da4dd726f88ec18c6f76ac21e51094891520ff5bdc43c139bb06ee93db8539dd0dcf6a29151dc645e43622251d713345fdd428d89bfbe82c8d328a6883308b8961ceecab3743643"}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x6c, &(0x7f00000005c0)={@multicast2, @broadcast}, &(0x7f0000000580)=0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) [ 2737.948860] audit_printk_skb: 3713 callbacks suppressed [ 2737.948869] audit: type=1400 audit(1575077068.440:398191): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.956579] audit: type=1400 audit(1575077068.450:398192): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.956919] audit: type=1400 audit(1575077068.450:398193): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.958464] audit: type=1400 audit(1575077068.450:398194): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.964538] audit: type=1400 audit(1575077068.450:398195): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.977627] audit: type=1400 audit(1575077068.470:398196): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.979440] audit: type=1400 audit(1575077068.470:398197): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.983551] audit: type=1400 audit(1575077068.470:398198): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.993632] audit: type=1400 audit(1575077068.470:398199): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2737.995515] audit: type=1400 audit(1575077068.470:398200): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:29 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) syz_open_procfs(0x0, 0x0) 01:24:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:29 executing program 5: r0 = socket$inet(0x2, 0x80801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 01:24:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)) 01:24:29 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000000240)=""/191, 0x26, 0xbf, 0x8}, 0x20) 01:24:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)) 01:24:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8fff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 01:24:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @broadcast}, @icmp=@timestamp}}}}, 0x0) 01:24:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r3 = creat(&(0x7f0000000100)='./bus\x00', 0x256) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x2008001) dup3(r4, r3, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000000), 0x200a00}]) poll(&(0x7f00000000c0)=[{}], 0x1, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x5, 0x8f, &(0x7f0000000280)="25b8868d509055fd157eaf64ac87f1f142e407a0413805abb0e6e80fd3ea2138b2b103af01923739b48198c8ba40480866c409e2c9fccfbf72d2e2b96a4e7ffca1e0650c108a163da4dd726f88ec18c6f76ac21e51094891520ff5bdc43c139bb06ee93db8539dd0dcf6a29151dc645e43622251d713345fdd428d89bfbe82c8d328a6883308b8961ceecab3743643"}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x6c, &(0x7f00000005c0)={@multicast2, @broadcast}, &(0x7f0000000580)=0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) 01:24:29 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:29 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) io_setup(0x81, &(0x7f0000000000)=0x0) io_submit(r2, 0x2, &(0x7f0000001380)=[&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 01:24:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="9389a5eb4888101a3639d110c100804f", 0x10) close(r0) 01:24:30 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) r14 = gettid() ioprio_get$pid(0x1, r14) 01:24:30 executing program 5: r0 = gettid() uname(0x0) timer_create(0x0, &(0x7f00000006c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCMBIS(r1, 0x5416, 0x0) tkill(r0, 0x1000000000015) 01:24:30 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x323) r3 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8fff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000300)={0x0, 0x41000000000004, 0x0, 0x0, 0x3, [{}, {}, {}]}) 01:24:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 01:24:30 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:31 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, 0x0, [{r1, 0x0, 0xffffffffffffdb2c}, {r2}]}) 01:24:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x2, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x0, 0x4f04}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) 01:24:31 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x2, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfe}}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0xb309a17e871cc587}, 0x14}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000340)) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000002fc0)={0x0, 0xfb, 0xfd5, 0x1, 0x89, "d4e7376f3b4d76fbda37026a3937feb4", "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"}, 0xfd5, 0x7) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f52972", 0x14}, {&(0x7f0000001c40)}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b5", 0x40}, {0x0}, {0x0}, {&(0x7f0000000f40)="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", 0x322}], 0x4}}], 0x2, 0x80) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) 01:24:31 executing program 3: r0 = epoll_create1(0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="92128bec804056b8b5f168000000", @ANYRES16=0x0, @ANYBLOB="0002a4971841fcdbdf250100000010000400000000000600000001000080080003000200000014000100fe80000000000000000000000000001c080002000100008008000300ff070000080005000100000008000200050000000800050003000000"], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c80)=ANY=[@ANYBLOB="140000000301ffff808fc201000000000000101ba119062e9eab80cc3321f24b"], 0x20}}, 0x0) recvmmsg(r2, &(0x7f00000013c0), 0x4a5, 0x200002, &(0x7f0000000c40)={0x77359400}) 01:24:31 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000003340), 0x60) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) dup2(r3, r1) 01:24:31 executing program 4: r0 = gettid() clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xfffffffe) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) 01:24:31 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) gettid() 01:24:31 executing program 2: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x5}, @enum={0x1000000, 0x0, 0x0, 0x5}]}}, &(0x7f00000002c0)=""/236, 0x32, 0xec, 0x8}, 0x20) [ 2741.784763] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program 01:24:32 executing program 2: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) [ 2741.850513] futex_wake_op: syz-executor.4 tries to shift op by -1; fix this program 01:24:32 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) write$P9_RXATTRCREATE(r0, &(0x7f0000000040)={0x3ba}, 0x7) write$nbd(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xce) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="1f06bfb8", 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 01:24:32 executing program 3: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) mknod(&(0x7f00000000c0)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='^posix_acl_accessppp1\\\x00', 0x0) splice(r0, 0x0, r1, 0x0, 0x20, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, r2+30000000}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() tkill(r5, 0x1004000000013) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="e6"], 0x1) 01:24:32 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x2, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfe}}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x20000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14, 0x32, 0xb309a17e871cc587}, 0x14}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000340)) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.upper\x00', &(0x7f0000002fc0)={0x0, 0xfb, 0xfd5, 0x1, 0x89, "d4e7376f3b4d76fbda37026a3937feb4", "e47b60c2b2f3d8542917b481ef2f59cd2f30a5755a7f1a1722ae143b6fa1e13f22a389599d311a7385f840a2fe8b9b5d246f77d9ced5d4cbc357e435ac7722a3ee282d3590cb056593d8d50eae1ef9266506602abea11b5ae8c5668177dca632ff2a7fb798144ebd264a0a19e8005e1dc91a11a859801f77bac3d3ae151c3230cebb5148105277088215a0102df10c56d66cdf936eb5c3abbc1fb6ee2df242eccf587b835b11e514f54e52878844ad644442612eb971672960ca71892953e04b4d1876af0520eb9f3664621c9e179eaa1ac4fa8afcbb17756dd0d70ba9714b68b7df5e61fc6fe04f76e848bed4643d8d1eb86c84de2ebee92c641aab1b643a0f356e28f09d2ee3e2f9c9bdcbed821705279a895b0aa8629fac0e221d5323107ceb0d02c01cd190c9a4cac5682ef8e0e9a22159fd48f135472796f153e52c7a56317e88d9e94b0596512360c7841233dd314de33085f2663f6a6203d34c3654e20e3fdeb1031e75d18e790ed6469756abed56bd23345500d77400fd115c8000dc6f4f7c7e882b86260ab00bb8ad7abfd97ee429855b98e5695a57a56a2b506380b80c4a042a6d1200d302b2e9d87c0f90ebd1370611670ce67fa234ee484dfc8bd01ebdc3122256a1183b442f24b06d2291dc84cdc456af9daf0066a1cd2f3fb3b7a046659981b676ad0a2a68c63f49a0b0697f0d7e0fc5464a36d0c92365fb72a19e05724838efe2746b8f47097a5afae3113bdf4ba61beabd4ffe29334d6bbb7307f3fb719388ed48b85577504ffda3ab6627eecbf380e246798f70bc392b4761e292cbb2b645d4759ad4d8adb914b2c66dccfed5c48308018a5b5e7c00bc1859911095245e468f561fe3f303a5048413b3b438311d359780a2b57d7727d7794f77b05a554ec986d0b5a2fb9cf7dd254ce7294b545cf74a7defe6b830d01dae01ab19b95061fd7841306553882576c887193609a545c7fac639842ac57eae0fbb6b89cf1a602432308abb1defa66ac5a5e1c61644329a1165ebe9594b57e03cdde324941f3b5f32b24f109493da8615209733b41b5d2d739663f9585a082b18f82becdb1e6424bb959dbd580dd1c940b402ccbfe4af6250ace5f4b89aeac6a8125ac041003646524f1f6b9c41d2f7867f6e92efb78909f5be20c3fee89cb8b4820ac7235dac43f7cb8e3764d5f9c64a00cd6671f9719f71388f45ef3ce8c84a20ef5d692cb8a67cd2bf5649e19306e4b2e2ec1b3e86fdf39e783c37171322f0911674d00ac1e7d962450be4765811799aa874f84b8a96f01cc1088728174e0fa4d4c012965af3486edeb66acb63ad4ffce5dc9facb6a068da4504b28add08850865ca3a271a175574d50fcac11b2a9c66788fbd241b3899322d9b189def82da1522604e42ca58a4c171a497d30a305e200668802c04a5ba8957b93ce4f65b3e216a9b5e212e5d0076494cd2d46a9917ea3032fe422b4aa45dc98c05a60a5c9a5e71c5dfe23a507b8bf0141969080c578496278598afd3f552b5c139cc8086af26c6d42c716e00b600e8898a3d313c681e0217463323f38d2e9b585acad06c67e80640aeaae85313dcc8d74e6a97e2ac5b5ccea91048a364cbd0e88a964c4e7aeca5de5eafc67445abf3f08d8715b6ce56b8043fc48aa42d52f2b5c71da2a0725c2d7326af905e0b8bf09ab6403cc9157d70d395d71a62f5d3c93d326b887c07e10d7a01fdf346f787be3907578f611b39bc9dfc585db297f82a5287f199947a1316d2e40ceda1084ed52938107a15cfc13e6db5ab3915d693a82ad567f1b9320a39c0b9e22a7de7eaefab42625bbfe357587340a3e9282439fa7312518379558373ff4c5f665d7b2e19e67bac10cf017b258809117c4bb666744a60704944e93ba92a47c1f7e18644634954145296a6465a7bf0899ee2961afa41e392694a35930add36ab58df882aebf4662c93102169b5c5255e0c39fff9d1817139303ff4061c9dcfdf569bf284376d2a5d8dd2cde87f9596e7b8bc32666ff2d82a3fc939d81edc62ec07826fbc89568ac1e3eca040c29f6d974e01979bd1e0d69e0986ea04dada004e7d9634b429131ec5726d2fe9ce28b987fbe6e470c4f6501b7a7ff331ad8da8be403615dd030ec8e003132f23870f1e6ea2debeca575d51505e8ab9a48251040f9e8283b44a13f5391540b517e7d96c6f8293582deea135206ae0c74822939b5bba3f9df948c4352d7c1fe0cd12312468980090a9ca31836b2eebe424dc73cbd469200d270b0b1d6ba1a864f0a32a574c66b16bdefea02e4a6f91b711e1b89c1ee79e58df67cc154e2c813465c5091f61f6fc3c51b6f19a70882e6f922f94a75faf87c4f00eeaea794588c48b2ea2367fb34ceea7457039abe33df994bdab0604e76fbc1beff9300a67a7e73bf0651086df95b00b15e4205b2d4ad5a781714956eb61de6072204a6d80b5e246d383ea48f1e162049cb3a96b14ec59d5c82cd77ffc4191d860527d66d248d6ab36ed5133626e890792ca2c6a80756f5d97aebeaecdad6aaf640d9e8e197407297717281e7193554df17c7f7db51c22c292e9d660b5791a1766f6f9c481861983e61febf80e5237c74cd0b6cec2f632f6a0f63d120aa14f66d20341fe80feac2391911f04ea40b4b651e0730f24d3b39eb05d0c82c94e9c5a894102890953e91085225c86470bd75352791e98c88104a865126986bf712a5537319dab3f8aaa941b39a523ab65ee393a6e5b33be2fc36db576632d613a9051f199848c418a84540fad34a5e77e8ab75cd38c99559c3bf2192710686567bf9c007b10b46c4eb48a6ca6cf568feb5bafe1e3597bad75bcffe4a36341e3e4669971c710373ee2d5d86a5e14903b2ea701ca397cbd2f0b21f48899d959b5d12b135e1d8b0f5721b632fc04460cb065483b8f3baba7140378e2037866a6b4a6477e600f42f1ebe405f0eb4b70d1469ae9df0db712734374b8c7108edd2c2f232f3bd615b0b9e1f219ba05be65e0f1c86ba6c32453a08839a32e7495a1bd876ef4fec946198850daeb9b771dcc8e15217c8bfcbf616d6ad09b0ca3207e16c6e405201787a79ab7a84f16d98a7a0187501af587ba9ccc9724ae8608e60e0f44b98cfa4558d9fcdc221f67980dc2cadfcc198ff21fe3f41ef99c660daccb1b433f5df1847121b91b890201fc39890765a1b8768d9beb99e3dce1e31e14067fdd54db6999cb5d9e037100eaa11a22178dd18bab0aab72f474387693847163fbfff84996fbfa44e3641747115a991fb9ee65dc40f87e78b95a2cc837a3465b326e8ec5bb5bdaa82c5cf74a4c66eec0588817abe4320a7b56de44b9cd1dc2ca6d13d8724a318b1de4bc1a20efb462c13f9ab82ac2050280302f5050b168c36d328e5b78d0b361b26d1490621b469db31351dcbce57b48c4cfa4729d7d844e7e82083039e382f584e3f48453812b8f188c69feab51f0ce566a91e99ef00d179c85a2d6b7edf8c8b91dcb43473f1827ebf84ff86fdddab867fecf8fc0d0c4a48f8b187b27a2d0f4a9ed4707092188693312271b93b06ba20aea3a1f32671365c049798ff7f0a82b472b238d70fc1dc438b2e4cc8d16d7f5fe1bcdc7dfb661044783511e237d448f37b37ef88c8540b8164a7a8aafa56a87949980a00a60396b028420ae01ddbb0933e5080fb734de739cea1dc93ea69eb55556a218f62eefc930a43ceeb01dac4241b938b41d242c3152069bbad93c83ae484df0dd0ea9888ebc7611c5cc89df9112d751e6824cb5afd01e97d797070b5f08c6718d726693ad4468b9995b1df5be39afb4aa6288c8f520c41cf20f479a9469c857ac4b641008bb47b098398167a088375daba3a4af72f78e4d0e7c7a114b6841566e71bcd5b9e5726643f73824f440b7d8ba2a38ee9133a4ad95062362326214bde313ac420780f9f72c3cab38133dc1928a360cf28e67479a93847fab45f8de4fd21379e32bd37c6b70c6d26fb1f1da3eed2f77c423cf27506aad159d288455ac1a5e9a320cd4598ad87b34178c40af2382a10799c2726726d9248f78a7a216c1eaf3d549e4f27a3ff932d871fc5359c7a303974812e0be76c899bbc81e37b6f1af47a1958f2d52fee551d437c791ad6538ef6942a747abdcee06c408584b6c041a1d269210e13fac5c92f3e1b48c65bebbdad8555305cc7f647e8d27701418f46e787f4a9362339d8e3c41d2b87925e2789cffc7d1485600db5a3f83e7d1b887ad5c0c681ca585eac6df30dcc3b87dd1b989b85a88cc374f22297280e9c4e52a7638ae866c133bd4e6788818e615569811653f3b5a94e9f8a27e2c798e7dcfab317a44248f140a1d51817d476462c32197122ca0ce232275da4ea18bd7afc16afebdf31b53afe8a2770d7e0a4715cc5db63ce703651ffb751d89e7d621767bcf55eab56d590cebf71ecacdbbbfd2c6a332e610998196d646cc100acd70172121a65a649c909532dc9a45de4a00d2b5ae7e35885aacd9a7dcae8bbb5ccc60124e6f9928d4442c6859decbc1cd3b3d537cbb4efb992ffbfe09eb0330a8370b2e7eb4e9c9a286f842bb30822ad0682a4dcc1292a4b19d99fded77cbc0ef1b066a02f121248e8448591bcc643ad196bf239e0afa12bc393a3c5c81cdeb8fe58a290a441f1c659ef185d0aa401f30ba99788f8cfe00a4a631302ee42d131c82ae6d03e3767548f7a244823224e5cd02c6db7a4fd629b61b1d62199acc92c8b0a5b8329354e7e586418a656c137396cc8f887b9437ac854ef75c7da89a70b16c5bd3af71627eee845f1628b1c8c1fa14e309050662dc44d4a1a67f7c9d7512b49d2298b7abca3b6cfe01470d9f7fbbbe4b550f501e1e876bb7e59d8aafe306ce567fd00d1867952e06637f58e2a2479d7c8394f07732eb47ab53427e6e43687052ff3d6f9198df8ca93af83bc3742cfc90d2d2814c31db82446e0a55eb4b49071e1bfd14b42833deef98e33e4c038781c96ca2f15a63ccd52f254822906c921c02c33dbc308d239d78e799ee74afa01b4a48e5e41c75706a6b70ea4f38679045d28ee7070c499406d9cfbe6b2500cc96a791e59fe33d47904da31fdc71a8cc9fba4e88d75c3e465ba10728f8caa856812e7771bc4bae6fb1bd91ad8fde945c5bb1b9feb443bd18988acc43f531b356c6c3f3e415b09ed9836d57b9a6de415078e38f3a804a866b58dfbff700f9e5d97478beb9abe34b995f8f73dc95af2b566a7fb554cc44397136535a5dab09ba2a1c9ab4350cf51bcdb5297b81083fb9c4bd184bd97fa5e48cf732a2710c4b29023b36f63124802b1a7663f007084691e5441db1792ce6e9c271b520085033354c1bbdcd99329c0ed40d85cb476efaa9cfe89317dc3b1a2ea7f93e880313e45ea8d06f7f7f8cb7cabc1f9c81d39d1f1ce6ab4ac8fdceaebefb69ac27a16d7909cfba939fa07aacbde62e04c7468a2b141cd200aa8206c471c190ea696f8416423e8cc2595882ea18778198fe89f5e45a8de1ab38bc91d9b04c61378e3bedae0e4ef5d34146fdb4e7634ac8b9b071084e350533c6d65b8bf8957cc7ef89dd8cac4417535ede10aa01a289baf859c393c1967e2daa520d92c9d2daeaf4dff00845f7e6f3fb4a8b78c9886993d003f71bba2686ef4a25988be4a02ccb512d49ca3acda7c61e523c5beab82d9db21e0f815edd9f5dcfaedcee"}, 0xfd5, 0x7) sendmmsg(r2, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000540)="9033877ace25a0cd47de5752f2fe725302f52972", 0x14}, {&(0x7f0000001c40)}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000080)="4326b5be4c72829e48001bfdce33d9a34689f07e340cec408be4e862cc21d93ea75e6e79c33cb2966b5a3e0a60677b6dbbb84bd6946d811304b2269c4dfbf4b5", 0x40}, {0x0}, {0x0}, {&(0x7f0000000f40)="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", 0x322}], 0x4}}], 0x2, 0x80) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) 01:24:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r1) close(r2) pipe(&(0x7f0000000240)) splice(r0, 0x0, r2, 0x0, 0x2, 0x0) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f00000004c0)=']', 0x1}], 0x1, 0x0) write(r0, &(0x7f0000000000)="2400000012005f34ff0f000000000000000000000000ffa4f4d900"/36, 0x24) 01:24:32 executing program 2: socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:33 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r13 = getgid() fchownat(r10, &(0x7f0000000000)='./file0\x00', r12, r13, 0x0) 01:24:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x11, 0x1a001000000}, [@ldst={0x6, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x9d}, 0x48) 01:24:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) [ 2742.803138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 2742.964863] audit_printk_skb: 2646 callbacks suppressed [ 2742.964872] audit: type=1400 audit(1575077073.450:399083): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.971332] audit: type=1400 audit(1575077073.460:399084): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.987184] audit: type=1400 audit(1575077073.480:399085): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.989177] audit: type=1400 audit(1575077073.480:399086): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.991065] audit: type=1400 audit(1575077073.480:399087): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.992915] audit: type=1400 audit(1575077073.480:399088): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2742.994817] audit: type=1400 audit(1575077073.480:399089): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2743.095727] audit: type=1400 audit(1575077073.580:399090): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2743.117233] audit: type=1400 audit(1575077073.600:399091): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2743.130293] audit: type=1400 audit(1575077073.600:399092): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:34 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) 01:24:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) r5 = creat(&(0x7f0000000300)='./file1\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280)={0x99}, 0x9e79) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r5, 0x0, 0x0, 0x8}) [ 2743.504817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 01:24:34 executing program 0: r0 = socket$inet(0x2, 0x80801, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 01:24:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 01:24:34 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) write(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r3, &(0x7f0000000040)=""/11, 0xb) write(r2, &(0x7f0000000340), 0x41395527) socket(0x10, 0x0, 0xc) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:24:34 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x12) 01:24:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) r5 = creat(&(0x7f0000000300)='./file1\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280)={0x99}, 0x9e79) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r5, 0x0, 0x0, 0x8}) 01:24:34 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) getgid() 01:24:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 01:24:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 01:24:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000), 0x4) 01:24:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}], 0x1, 0x0) 01:24:35 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BLKSECTGET(r0, 0x1267, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0x0) 01:24:35 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x0) 01:24:35 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) fadvise64(r0, 0x0, 0x0, 0x3) 01:24:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}], 0x1, 0x0) 01:24:35 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) gettid() ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 01:24:35 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) 01:24:35 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='d'], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x9) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:24:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x8c, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) 01:24:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x0) 01:24:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}], 0x1, 0x0) 01:24:36 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) io_setup(0x81, &(0x7f0000000000)=0x0) io_submit(r2, 0x2, &(0x7f0000001380)=[&(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}]) 01:24:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x323) r3 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8fff) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000300)={0x0, 0x41000000000004, 0x0, 0x0, 0x2, [{}, {}]}) 01:24:36 executing program 0: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) 01:24:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x0) 01:24:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) 01:24:36 executing program 5: r0 = socket(0x0, 0x3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$packet_int(r1, 0x107, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x24a) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000040)}, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x80fe) 01:24:37 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/cgroup\x00') syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/cgroup\x00') 01:24:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x0) 01:24:37 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = syz_open_procfs(0x0, 0x0) r11 = socket$inet(0x10, 0x2, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) ioctl$PPPIOCGNPMODE(r10, 0xc008744c, &(0x7f00000001c0)={0x8057, 0x3}) 01:24:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x323) r3 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8fff) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000300)={0x0, 0x41000000000004, 0x0, 0x0, 0x2, [{}, {}]}) 01:24:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) 01:24:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x6}, 0x10000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) syz_open_procfs$namespace(0x0, 0x0) creat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) open(0x0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r3 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a2ff81d6bfa135aa61e8825b", 0xc, 0xfffffffffffffffa) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) add_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000480)="6a7325ca14054ca848976ce88689992ea6e559b828edd334d751b232c9212a8f78c4604b884017f8803108b31366ba616caf4ca0f91995400473c164afebfc178ee56a4e628daedac94538f9513ef46b8ff8526a3e7243e1335dc76a153f4b153adf6c05b81023587e4aa47fc250323bbdf9528b2396a963395d1c9fca541b4d1798ac78b412f87432ff5caaf2dd0eac4823d7437efd853c851340e5", 0x9c, r3) 01:24:37 executing program 3: socket(0x0, 0x3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x80fe) 01:24:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) 01:24:38 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:38 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_open_procfs(0x0, 0x0) r10 = socket$inet(0x10, 0x2, 0x0) sendmsg(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:38 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003940)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r0, &(0x7f00000017c0), 0x244, 0x0) 01:24:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) [ 2747.972137] audit_printk_skb: 2784 callbacks suppressed [ 2747.972145] audit: type=1400 audit(1575077078.460:400021): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x6}, 0x10000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) syz_open_procfs$namespace(0x0, 0x0) creat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) open(0x0, 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r3 = add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a2ff81d6bfa135aa61e8825b", 0xc, 0xfffffffffffffffa) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) add_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000480)="6a7325ca14054ca848976ce88689992ea6e559b828edd334d751b232c9212a8f78c4604b884017f8803108b31366ba616caf4ca0f91995400473c164afebfc178ee56a4e628daedac94538f9513ef46b8ff8526a3e7243e1335dc76a153f4b153adf6c05b81023587e4aa47fc250323bbdf9528b2396a963395d1c9fca541b4d1798ac78b412f87432ff5caaf2dd0eac4823d7437efd853c851340e5", 0x9c, r3) 01:24:38 executing program 3: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) [ 2747.974716] audit: type=1400 audit(1575077078.460:400022): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2747.990966] audit: type=1400 audit(1575077078.480:400023): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2748.037316] audit: type=1400 audit(1575077078.530:400024): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) [ 2748.048859] audit: type=1400 audit(1575077078.530:400025): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:39 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:39 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2748.050607] audit: type=1400 audit(1575077078.530:400026): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2748.052495] audit: type=1400 audit(1575077078.530:400027): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2748.054138] audit: type=1400 audit(1575077078.530:400028): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) [ 2748.074220] audit: type=1400 audit(1575077078.560:400029): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:39 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) [ 2748.080509] audit: type=1400 audit(1575077078.570:400030): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:39 executing program 0: socket(0x0, 0x3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x80fe) 01:24:39 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2749.116417] input: syz1 as /devices/virtual/input/input144 [ 2749.245942] input: syz1 as /devices/virtual/input/input145 01:24:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) 01:24:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000002c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)) 01:24:40 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) [ 2749.917486] input: syz1 as /devices/virtual/input/input146 01:24:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8fff) 01:24:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) 01:24:40 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:41 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:41 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='statm\x00') lseek(r1, 0x7, 0x0) 01:24:41 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fallocate(r0, 0x4000000000000010, 0x2, 0x7fff) 01:24:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)}}], 0x2, 0x0) 01:24:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) 01:24:41 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 01:24:41 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x80fe) 01:24:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)}}], 0x2, 0x0) 01:24:41 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) 01:24:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) clone(0x2142091ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 01:24:42 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) syz_open_procfs(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:42 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24000000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) r2 = socket(0x10, 0x80002, 0x0) bind$netlink(r2, 0x0, 0x0) write(r2, &(0x7f0000000140), 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r2, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfb120eb7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, r3) r4 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setreuid(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) setreuid(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 01:24:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)}}], 0x2, 0x0) 01:24:42 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) 01:24:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB="66696c746572ffffffff0040000000000000110000000000000000000000040000600100016902005c00000000000000001bbfe202d1cc03a275eb3900430c8cee2d05abbabe5c76ff000000000000436cb59ed427"], 0x1) 01:24:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000002000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2752.300743] selinux_nlmsg_perm: 5 callbacks suppressed [ 2752.300753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=31001 comm=syz-executor.0 01:24:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x1, 0x0) [ 2752.436548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=31005 comm=syz-executor.0 01:24:43 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x24000000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) r2 = socket(0x10, 0x80002, 0x0) bind$netlink(r2, 0x0, 0x0) write(r2, &(0x7f0000000140), 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r2, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfb120eb7) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, r3) r4 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setreuid(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r5) add_key$keyring(0x0, &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) setreuid(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 01:24:43 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x0, @remote}, {0x2, 0x4e23, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) 01:24:43 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) 01:24:43 executing program 5: r0 = socket(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) write(0xffffffffffffffff, &(0x7f0000000140), 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000b4bffc), 0x4) sendto(0xffffffffffffffff, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0xc00) pipe(0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), 0x0) setreuid(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000300)) keyctl$chown(0x4, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getegid() ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 01:24:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x1, 0x0) 01:24:43 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) r10 = socket$inet(0x10, 0x2, 0x0) sendmsg(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) [ 2752.978271] audit_printk_skb: 2760 callbacks suppressed [ 2752.978279] audit: type=1400 audit(1575077083.470:400951): avc: denied { sys_admin } for pid=2086 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:43 executing program 0: socket(0x0, 0x3, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x80fe) [ 2752.991401] audit: type=1400 audit(1575077083.480:400952): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:43 executing program 3: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) lseek(r0, 0x0, 0x3) [ 2752.993137] audit: type=1400 audit(1575077083.480:400953): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2752.994973] audit: type=1400 audit(1575077083.480:400954): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:43 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:24:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x1, 0x0) [ 2753.007560] audit: type=1400 audit(1575077083.500:400955): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 2753.021830] audit: type=1400 audit(1575077083.510:400956): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) close(r1) [ 2753.026996] audit: type=1400 audit(1575077083.520:400957): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) [ 2753.028820] audit: type=1400 audit(1575077083.520:400958): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) [ 2753.030650] audit: type=1400 audit(1575077083.520:400959): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 3: socketpair$unix(0x1, 0x8000000000003, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x3ba}, 0x7) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000000)="1f06bfb8", 0x4) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) 01:24:44 executing program 0: unshare(0x20000) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000540)='ns/mnt\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) [ 2753.032467] audit: type=1400 audit(1575077083.520:400960): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) [ 2753.095436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=31021 comm=syz-executor.0 01:24:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x20, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x20}}], 0x2, 0x0) 01:24:46 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = gettid() ioprio_get$pid(0x1, r9) r10 = socket$inet(0x10, 0x2, 0x0) sendmsg(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in=@remote}, {@in6=@rand_addr="8b7e34b04eb979dd5501ab4a520216d3", 0x0, 0x32}, @in6=@mcast1}}}, 0xf8}, 0x8}, 0x0) 01:24:46 executing program 4: close(0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:24:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) 01:24:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8fff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 01:24:46 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000280)=ANY=[@ANYRESHEX], 0x12) r1 = socket$inet6(0xa, 0x80003, 0x9) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:24:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000003740)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x703, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 01:24:46 executing program 4: close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8fff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 01:24:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:46 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) rt_sigsuspend(&(0x7f0000000080), 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 01:24:47 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) gettid() r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004840)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=[@pktinfo={{0x24, 0x29, 0x2, {@rand_addr="2d8d677911ef6984619122b5ee7b757a"}}}], 0x28}}], 0x2, 0x0) 01:24:47 executing program 4: close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:47 executing program 0: ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x24c, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r0 = gettid() openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x800000000000014) 01:24:47 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fallocate(r1, 0x4000000000000010, 0x0, 0x7fff) 01:24:47 executing program 4: close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:47 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:24:47 executing program 2: r0 = socket$inet(0x2, 0x80801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="23a1200ad8e80000d280ef"], 0xb) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 01:24:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') lseek(r1, 0x7, 0x0) 01:24:48 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @random="c69a6b4c3e77", [], {@ipv6={0x86dd, {0x0, 0x6, "8000", 0x14, 0x6, 0x0, @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 01:24:48 executing program 4: close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:48 executing program 3: [ 2757.987135] audit_printk_skb: 2751 callbacks suppressed 01:24:48 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00fb7f00068da8da2e77ab9c998a8ef8b34244a45f8da97569a67a97ba909ebddac701a1fae10980b0a2882ae6fd518d293dc36cbfe1a78dafb2e7e5942e77efb67596d284102f31603f310184cd8ee4e5bd185c6e60f53df295fb7f045690d7a2837db1982989139236"], 0x1, 0x4) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x4) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000007, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setreuid(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:24:48 executing program 2: 01:24:48 executing program 0: 01:24:48 executing program 4: close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) [ 2757.987144] audit: type=1400 audit(1575077088.480:401878): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f0000000340)="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", 0xffffffffffffffc3, 0x100008c0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="91", 0x1}], 0x1}, 0x0) [ 2757.989982] audit: type=1400 audit(1575077088.480:401879): avc: denied { dac_override } for pid=31167 comm="syz-executor.4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2758.004354] audit: type=1400 audit(1575077088.490:401880): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:48 executing program 0: r0 = gettid() capset(&(0x7f0000000100)={0x20080522, r0}, 0x0) [ 2758.004604] audit: type=1400 audit(1575077088.490:401881): avc: denied { dac_override } for pid=31166 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 4: close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) [ 2758.023965] audit: type=1400 audit(1575077088.510:401882): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 3: [ 2758.035405] audit: type=1400 audit(1575077088.510:401884): avc: denied { dac_override } for pid=31166 comm="syz-executor.5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 0: [ 2758.046656] audit: type=1400 audit(1575077088.510:401883): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00fb7f00068da8da2e77ab9c998a8ef8b34244a45f8da97569a67a97ba909ebddac701a1fae10980b0a2882ae6fd518d293dc36cbfe1a78dafb2e7e5942e77efb67596d284102f31603f310184cd8ee4e5bd185c6e60f53df295fb7f045690d7a2837db1982989139236"], 0x1, 0x4) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x4) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000000000000007, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setreuid(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) [ 2758.054662] audit: type=1400 audit(1575077088.540:401885): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) [ 2758.056507] audit: type=1400 audit(1575077088.550:401886): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2758.062119] audit: type=1400 audit(1575077088.550:401887): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:49 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) openat$tun(0xffffffffffffff9c, &(0x7f0000000700)='/dev/net/tun\x00', 0x8000, 0x0) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:49 executing program 3: 01:24:50 executing program 2: 01:24:50 executing program 0: 01:24:50 executing program 3: 01:24:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:50 executing program 0: 01:24:50 executing program 3: 01:24:50 executing program 5: 01:24:50 executing program 2: 01:24:50 executing program 0: 01:24:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:51 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:51 executing program 3: 01:24:51 executing program 2: 01:24:51 executing program 5: 01:24:51 executing program 3: 01:24:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:51 executing program 0: 01:24:51 executing program 2: 01:24:51 executing program 5: 01:24:51 executing program 0: 01:24:51 executing program 3: 01:24:51 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:52 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x10, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:52 executing program 5: 01:24:52 executing program 2: 01:24:52 executing program 3: 01:24:52 executing program 0: 01:24:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:52 executing program 2: 01:24:52 executing program 0: 01:24:52 executing program 3: 01:24:52 executing program 5: 01:24:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r0, r1, 0x0, 0x40000007ffffffc) 01:24:52 executing program 2: 01:24:53 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$inet(0x10, 0x2, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:53 executing program 0: 01:24:53 executing program 3: 01:24:53 executing program 5: 01:24:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:53 executing program 2: 01:24:53 executing program 0: 01:24:53 executing program 5: 01:24:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:53 executing program 2: 01:24:53 executing program 3: [ 2762.999697] audit_printk_skb: 3612 callbacks suppressed [ 2762.999705] audit: type=1400 audit(1575077093.490:403092): avc: denied { sys_admin } for pid=2081 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.002452] audit: type=1400 audit(1575077093.490:403093): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.004109] audit: type=1400 audit(1575077093.490:403094): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:53 executing program 5: [ 2763.008705] audit: type=1400 audit(1575077093.500:403095): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.011446] audit: type=1400 audit(1575077093.500:403096): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.013379] audit: type=1400 audit(1575077093.500:403097): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.015286] audit: type=1400 audit(1575077093.500:403098): avc: denied { net_admin } for pid=2086 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.015822] audit: type=1400 audit(1575077093.510:403099): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.020741] audit: type=1400 audit(1575077093.510:403100): avc: denied { sys_admin } for pid=2076 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2763.026274] audit: type=1400 audit(1575077093.510:403101): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:54 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) memfd_create(&(0x7f00000006c0)='em0\'mime_type:lo),:vboxnet0ppp0posix_acl_access+\x00', 0x4) r8 = socket$inet(0x10, 0x2, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:54 executing program 0: 01:24:54 executing program 3: 01:24:54 executing program 2: 01:24:54 executing program 5: 01:24:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:54 executing program 0: 01:24:54 executing program 2: 01:24:54 executing program 5: 01:24:54 executing program 3: 01:24:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:54 executing program 0: 01:24:55 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r7, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', @ifru_ivalue=0x403}) r8 = socket$inet(0x10, 0x2, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:55 executing program 5: 01:24:55 executing program 0: 01:24:55 executing program 3: 01:24:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:55 executing program 2: 01:24:55 executing program 3: 01:24:55 executing program 5: 01:24:55 executing program 2: 01:24:55 executing program 0: 01:24:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00'}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:56 executing program 5: 01:24:56 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$inet(0x10, 0x2, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:56 executing program 2: 01:24:56 executing program 3: 01:24:56 executing program 0: 01:24:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:56 executing program 5: 01:24:56 executing program 2: 01:24:56 executing program 3: 01:24:56 executing program 5: 01:24:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:56 executing program 0: 01:24:57 executing program 2: 01:24:57 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) openat$cgroup_int(r5, &(0x7f0000000680)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r7 = socket$inet(0x10, 0x2, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:57 executing program 3: 01:24:57 executing program 5: 01:24:57 executing program 0: 01:24:57 executing program 2: 01:24:57 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:24:57 executing program 3: 01:24:57 executing program 5: 01:24:58 executing program 0: 01:24:58 executing program 2: 01:24:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:24:58 executing program 5: [ 2768.006492] audit_printk_skb: 3609 callbacks suppressed [ 2768.006500] audit: type=1400 audit(1575077098.500:404306): avc: denied { net_admin } for pid=2077 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.007101] audit: type=1400 audit(1575077098.500:404305): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.012400] audit: type=1400 audit(1575077098.500:404307): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.021591] audit: type=1400 audit(1575077098.510:404308): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.027322] audit: type=1400 audit(1575077098.520:404309): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.037739] audit: type=1400 audit(1575077098.530:404311): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.039510] audit: type=1400 audit(1575077098.520:404310): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.039659] audit: type=1400 audit(1575077098.530:404312): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.041384] audit: type=1400 audit(1575077098.530:404313): avc: denied { net_admin } for pid=2075 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2768.041436] audit: type=1400 audit(1575077098.530:404314): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:24:58 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = syz_open_procfs(0x0, 0x0) fchownat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x400) r7 = socket$inet(0x10, 0x2, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:24:58 executing program 3: 01:24:58 executing program 2: 01:24:58 executing program 0: 01:24:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:24:58 executing program 5: 01:24:59 executing program 2: socket(0x10, 0x3, 0x0) dup(0xffffffffffffffff) open(0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x984efc2917936c42}, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 01:24:59 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 01:24:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(r0, 0x0, r1, 0x0, 0x1f, 0x0) 01:24:59 executing program 5: ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x24c, 0x0) r0 = gettid() openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x800000000000014) 01:24:59 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x10, 0x0, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @random="a54d1155e258"}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'}) 01:24:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:25:00 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) syz_open_procfs(0x0, 0x0) r6 = socket$inet(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 01:25:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)={0x0}) 01:25:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) 01:25:00 executing program 2: socket(0x10, 0x3, 0x0) dup(0xffffffffffffffff) open(0x0, 0x0, 0x0) gettid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x984efc2917936c42}, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) 01:25:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:25:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r2, &(0x7f0000000d00), 0x400004e, 0x0) 01:25:00 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x21) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000080)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 01:25:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 01:25:00 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:25:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3f, 0x6}, 0x10000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) pipe(0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair(0x0, 0x0, 0x6, &(0x7f0000000600)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') syz_open_procfs$namespace(0x0, 0x0) creat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) open(&(0x7f0000000340)='./bus\x00', 0x14000, 0x4) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a2ff81d6bfa135aa61e8825b", 0xc, 0xfffffffffffffffa) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x8000fffffffe) 01:25:00 executing program 5: sched_setattr(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 01:25:01 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x2a) r6 = socket$inet(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 01:25:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x40000007ffffffc) 01:25:01 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x4000, 0x3, &(0x7f0000ff6000/0x4000)=nil) socket$packet(0x11, 0x0, 0x300) 01:25:01 executing program 5: r0 = socket$inet(0x2, 0x80801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 01:25:01 executing program 0: pipe(&(0x7f0000000640)={0xffffffffffffffff}) read(r0, 0x0, 0x0) 01:25:01 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) fadvise64(r4, 0x0, 0x1, 0x3) fsetxattr$security_ima(r4, 0x0, 0x0, 0x0, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) fchmod(r5, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) ftruncate(r4, 0x4) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x800, [0x1841, 0x4, 0x9]}, 0x5c) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r8 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r9 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x20) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380), 0x1, 0x0, 0x0, 0x200404f6}, 0x30) ftruncate(r9, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 01:25:01 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:25:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 01:25:02 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:25:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:25:02 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) 01:25:02 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket$inet(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 01:25:02 executing program 0: inotify_init1(0x81000) 01:25:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) fadvise64(r4, 0x0, 0x1, 0x3) fsetxattr$security_ima(r4, 0x0, 0x0, 0x0, 0x1) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) fchmod(r5, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) ftruncate(r4, 0x4) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x40, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x800, [0x1841, 0x4, 0x9]}, 0x5c) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r8 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r9 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x20) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380), 0x1, 0x0, 0x0, 0x200404f6}, 0x30) ftruncate(r9, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000100)={0x0, r8}) 01:25:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:25:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tkill(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') lseek(r1, 0x7, 0x0) 01:25:03 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="15"], 0x1) r1 = socket$inet6(0xa, 0x80003, 0x9) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:25:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x40000007ffffffc) [ 2773.022761] audit_printk_skb: 3012 callbacks suppressed 01:25:03 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/150, 0x96}], 0x1, 0x0) [ 2773.022769] audit: type=1400 audit(1575077103.510:405319): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2773.030814] audit: type=1400 audit(1575077103.520:405320): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c10000300000000000000", 0x58}], 0x1) [ 2773.039014] audit: type=1400 audit(1575077103.530:405321): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:03 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r5 = syz_open_procfs(0x0, 0x0) read(r5, &(0x7f0000000040)=""/47, 0x2f) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x40, 0x81, 0x8, 0x540d6661}) r6 = socket$inet(0x10, 0x2, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) [ 2773.049116] audit: type=1400 audit(1575077103.540:405322): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) 01:25:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x0, 0x5, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 2773.068263] audit: type=1400 audit(1575077103.550:405324): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2773.070074] audit: type=1400 audit(1575077103.550:405325): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2773.071912] audit: type=1400 audit(1575077103.550:405326): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0xe, 0x0, &(0x7f0000000180)) [ 2773.073567] audit: type=1400 audit(1575077103.550:405327): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:04 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000640)=ANY=[@ANYBLOB="aaaaa8aaaaaa0180473bdb5d86dd6052000000080000fe6d00000000000000000000000000bbfe8000000000000000000000000000aa2f00810000089078"], 0x0) [ 2773.075288] audit: type=1400 audit(1575077103.550:405328): avc: denied { net_admin } for pid=2081 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) [ 2773.087454] audit: type=1400 audit(1575077103.540:405323): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xb7}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 2774.270442] sock: process `syz-executor.2' is using obsolete getsockopt SO_BSDCOMPAT 01:25:04 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") close(r2) socket$netlink(0x10, 0x3, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 01:25:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0805b5055e0bcfe8474071") sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xf4010000}, 0x1c) 01:25:04 executing program 5: 01:25:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x40000007ffffffc) 01:25:05 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r4 = syz_open_procfs(0x0, 0x0) read(r4, &(0x7f0000000040)=""/47, 0x2f) r5 = socket$inet(0x10, 0x2, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:05 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1, 0x7e86}, 0x3c) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000080)={0x0, 'batadv0\x00', {0x1}, 0xfbff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) r2 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xd0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002800ffcd3bff0f000000000000fffff7", @ANYRES32=r4], 0x2}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth1_to_hsr\x00', r4}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x0, 0xfffffff8, 0x9, 0x8, r0, 0x10001, [], r5, r6, 0x2, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 01:25:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") close(r0) 01:25:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x3e8}, 0x0) shutdown(r0, 0x1) 01:25:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3020000}) 01:25:05 executing program 3: 01:25:05 executing program 2: 01:25:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 01:25:06 executing program 5: 01:25:06 executing program 3: 01:25:06 executing program 0: 01:25:06 executing program 2: 01:25:06 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') syz_open_procfs(0x0, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3f}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) open(0x0, 0x141042, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') syz_open_procfs$namespace(0x0, 0x0) creat(0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) add_key(&(0x7f0000000200)='.dead\x00', 0x0, &(0x7f0000000280)="a2ff81d6bfa1", 0x6, 0xfffffffffffffffa) 01:25:06 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 01:25:06 executing program 3: 01:25:06 executing program 2: 01:25:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 01:25:07 executing program 2: 01:25:07 executing program 5: 01:25:07 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14502e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r2, 0x0) write$P9_RRENAMEAT(r2, &(0x7f0000000040)={0x7}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x0, 0x40000000000006}) 01:25:07 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x15f) 01:25:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000780)={'veth0_to_bridge\x00', 0x1fd}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') sendfile(r1, r2, 0x0, 0x0) 01:25:07 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:hald_sonypic_exec_t:s0\x00', 0x29, 0x0) 01:25:07 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') lseek(r0, 0x7, 0x0) 01:25:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, 0x0, 0x0, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x15f) [ 2777.195266] SELinux: mls: truncated level 01:25:07 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x15f) 01:25:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 01:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') lseek(r0, 0x7, 0x0) 01:25:08 executing program 4: r0 = socket$inet(0x2, 0x80801, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB='#'], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) 01:25:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x160) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) creat(0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 2777.687878] SELinux: mls: truncated level 01:25:08 executing program 3: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000ffff"]) 01:25:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 01:25:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') lseek(r0, 0x7, 0x0) [ 2778.025868] audit_printk_skb: 3368 callbacks suppressed [ 2778.025877] audit: type=1400 audit(1575077108.510:406455): avc: denied { sys_admin } for pid=2077 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r3, 0x208204) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14502e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r4, 0x0) write$P9_RRENAMEAT(r4, &(0x7f0000000040)={0x7}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000200)={0x0, 0x40000000000006}) [ 2778.037230] audit: type=1400 audit(1575077108.530:406457): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:08 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c5"], 0x1) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 2778.037595] audit: type=1400 audit(1575077108.520:406456): avc: denied { sys_admin } for pid=2075 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2778.039204] audit: type=1400 audit(1575077108.530:406458): avc: denied { net_admin } for pid=2076 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) [ 2778.043978] audit: type=1400 audit(1575077108.510:406454): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 01:25:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), 0x160) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) creat(0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 2778.046374] audit: type=1400 audit(1575077108.540:406459): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:09 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5500000018007fd500fe01b2a4a280930a00000000a843090000fe80390008000800080000dc13382d0010009b7a136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d240000060c", 0x55}], 0x1}, 0x0) [ 2778.048082] audit: type=1400 audit(1575077108.540:406460): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) [ 2778.049788] audit: type=1400 audit(1575077108.540:406461): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2778.051421] audit: type=1400 audit(1575077108.540:406462): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 2778.053118] audit: type=1400 audit(1575077108.540:406463): avc: denied { net_admin } for pid=2080 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 01:25:09 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5500000018007fd500fe01b2a4a280930a00000000a843090000fe80390008000800080000dc13382d0010009b7a136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d240000060c", 0x55}], 0x1}, 0x0) 01:25:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) dup3(0xffffffffffffffff, r0, 0x0) 01:25:10 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000000), 0x31b, 0x0) dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_rxfh={0x47, 0x0, 0x0, 0x0, 0x0, "7b54d2"}}) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000001008000800100004000000", 0x24}], 0x1}, 0x0) 01:25:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') lseek(r0, 0x7, 0x0) 01:25:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = inotify_init1(0x0) dup3(r0, r2, 0x0) 01:25:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000000ffffffff00000000000009"], 0x60) 01:25:10 executing program 4: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5500000018007fd500fe01b2a4a280930a00000000a843090000fe80390008000800080000dc13382d0010009b7a136ef75afb83de448daa72540d8102d2c55327c43ab82286ef1fdd20652383656d4d240000060c", 0x55}], 0x1}, 0x0) 01:25:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) dup3(0xffffffffffffffff, r0, 0x0) 01:25:10 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000300)="1f0000000104ff00fd4354c007110000f305010008000100060023dcbfdf00", 0x1f) [ 2780.131021] kasan: CONFIG_KASAN_INLINE enabled [ 2780.150604] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2780.207395] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2780.213666] Modules linked in: [ 2780.216991] CPU: 1 PID: 31724 Comm: syz-executor.0 Not tainted 4.9.141+ #23 [ 2780.224085] task: ffff880120c25f00 task.stack: ffff8801d3b88000 [ 2780.230138] RIP: 0010:[] [] ebitmap_destroy+0x32/0x100 [ 2780.238773] RSP: 0018:ffff8801d3b8f3d8 EFLAGS: 00010202 [ 2780.244217] RAX: dffffc0000000000 RBX: ffff8801c7185040 RCX: ffffc90000967000 [ 2780.251491] RDX: 0000000000000001 RSI: ffffffff81a17f01 RDI: 0000000000000008 [ 2780.258762] RBP: ffff8801d3b8f3f8 R08: ffff880120c26820 R09: 0000000000000000 [ 2780.266032] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801cef5bdc0 [ 2780.273304] R13: 1ffff1003a771e87 R14: 0000000000000008 R15: ffff8801d3b8f498 [ 2780.280579] FS: 0000000000000000(0000) GS:ffff8801db700000(0063) knlGS:00000000f5521b40 [ 2780.288821] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 2780.294704] CR2: 0000000008484bb8 CR3: 0000000102a04000 CR4: 00000000001606b0 [ 2780.301974] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2780.309336] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2780.316599] Stack: [ 2780.318752] ffff8801c7185040[ 2780.319728] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2780.330168] ffff8801cef5bdc0 1ffff1003a771e87 00000000ffffffea [ 2780.336656] ffff8801d3b8f418 ffffffff81a20997 ffff8801d3b8f8f8 ffff8801c7185040 [ 2780.344723] ffff8801d3b8f4c0 ffffffff81a2124e ffff8801d65e13f0 0000000000000008 [ 2780.352812] Call Trace: 01:25:10 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000300)="1f0000000104ff00fd4354c007110000f305010008000100060023dcbfdf00", 0x1f) 01:25:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) dup3(0xffffffffffffffff, r0, 0x0) [ 2780.355402] [] sens_destroy+0x47/0x90 [ 2780.360853] [] sens_read+0x1de/0x360 [ 2780.366218] [] ? cat_read+0x340/0x340 [ 2780.371681] [] ? cat_read+0x340/0x340 [ 2780.377148] [] policydb_read+0xdba/0x2390 [ 2780.382951] [] ? unwind_next_frame+0x7d/0xd0 [ 2780.389016] [] ? __save_stack_trace+0x7d/0xf0 [ 2780.395166] [] ? string_to_av_perm+0x90/0x90 [ 2780.401231] [] ? kasan_kmalloc+0xaf/0xc0 01:25:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) [ 2780.407298] [] ? kmem_cache_alloc_trace+0x117/0x2e0 [ 2780.414085] [] ? check_preemption_disabled+0x3b/0x200 [ 2780.420938] [] ? kasan_unpoison_shadow+0x35/0x50 [ 2780.427350] [] ? kasan_kmalloc+0xaf/0xc0 [ 2780.433071] [] ? kmem_cache_alloc_trace+0x117/0x2e0 [ 2780.439743] [] ? security_load_policy+0x137/0x9b0 [ 2780.446235] [] security_load_policy+0x264/0x9b0 [ 2780.452583] [] ? security_get_bools+0x690/0x690 [ 2780.458902] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 2780.461545] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2780.474238] [] ? __alloc_pages_nodemask+0x11df/0x1bd0 [ 2780.481089] [] ? trace_hardirqs_on+0x10/0x10 [ 2780.487154] [] ? do_raw_spin_unlock+0x135/0x210 [ 2780.493502] [] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 2780.500184] [] ? vmap_page_range_noflush+0x512/0x770 01:25:11 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000300)="1f0000000104ff00fd4354c007110000f305010008000100060023dcbfdf00", 0x1f) [ 2780.506947] [] ? alloc_vmap_area.isra.8+0x8d0/0x8d0 [ 2780.513617] [] ? kasan_unpoison_shadow+0x35/0x50 [ 2780.520027] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 2780.526786] [] ? check_stack_object+0x110/0x150 [ 2780.533120] [] ? __check_object_size+0x248/0x38e [ 2780.539621] [] sel_write_load+0x19b/0xfa0 [ 2780.545430] [] ? sel_read_bool+0x240/0x240 [ 2780.551317] [] ? trace_hardirqs_on+0x10/0x10 01:25:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) [ 2780.557646] [] ? trace_hardirqs_on+0x10/0x10 [ 2780.563885] [] ? trace_hardirqs_on+0x10/0x10 [ 2780.569949] [] __vfs_write+0x115/0x580 [ 2780.575493] [] ? sel_read_bool+0x240/0x240 [ 2780.581520] [] ? __vfs_read+0x560/0x560 [ 2780.587151] [] ? check_preemption_disabled+0x3b/0x200 [ 2780.593998] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 2780.600844] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2780.609255] [] ? __sb_start_write+0x161/0x300 [ 2780.615405] [] vfs_write+0x187/0x520 [ 2780.620781] [] SyS_write+0xd9/0x1c0 [ 2780.626079] [] ? SyS_read+0x1c0/0x1c0 [ 2780.631539] [] ? do_fast_syscall_32+0xcf/0xa10 [ 2780.637778] [] ? SyS_read+0x1c0/0x1c0 [ 2780.640230] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2780.651796] [] do_fast_syscall_32+0x2f1/0xa10 [ 2780.657949] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2780.664623] [] entry_SYSENTER_compat+0x90/0xa2 [ 2780.670877] Code: 89 fe 41 55 41 54 53 e8 6d 3b 90 ff 4d 85 f6 0f 84 a6 00 00 00 e8 5f 3b 90 ff 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 a5 00 00 00 49 8b 1e 48 85 db 74 32 49 bd 00 [ 2780.698914] RIP [] ebitmap_destroy+0x32/0x100 [ 2780.705198] RSP [ 2780.762860] ---[ end trace be068092000e4ade ]--- [ 2780.768582] Kernel panic - not syncing: Fatal exception [ 2780.774762] Kernel Offset: disabled [ 2780.778377] Rebooting in 86400 seconds..