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", 0x1000}, 0x1006) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r2, @ANYBLOB="200228bd7000ffdbdf250f000000900005001c000200080001000e00000008000200650e000008000400fdffffff08000100657468000800010065746800080001006962000014000200080002000000000008000200a25b0000440002000800020000008e56ed0000080002000000000008000100020000000800020082000000080002000800000008000300010000000800020006000000080003000900000024000600040002000800010000020000080001000400000004000200080001001f00"], 0xc8}, 0x1, 0x0, 0x0, 0x4}, 0x8000) write(r1, &(0x7f00000000c0)="ea3bf687c019684c6e9db6946e559180bccf2c45fb1294a5ec6f219ceffdc02ffc417560b1264d252e6b3bb35cd05e5463e292dc4202faca718462035589926d99fc64d1", 0x44) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r3, 0x0, 0xa, &(0x7f0000000040)='net/route\x00', 0xffffffffffffffff}, 0x30) close(r4) preadv(r3, &(0x7f0000000700), 0x31f, 0x0) 00:25:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:25 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:25 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYPTR64], 0x8) sendfile(r1, r1, &(0x7f00000000c0), 0xfff) 00:25:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:26 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') gettid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000004c0)=0xe8) geteuid() getuid() 00:25:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0xfffffffffffffff5, 0x2, {0x5, 0x9, 0x0, {0x4, 0xc0000000, 0x4, 0x2, 0x8, 0x5df, 0x5, 0x8000, 0x0, 0x6, 0x3, r1, r2, 0xcea4}}}, 0x78) 00:25:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0xfffffffffffffffc) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYPTR64], 0x8) sendfile(r1, r1, 0x0, 0xfff) 00:25:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:26 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:26 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:26 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) prctl$PR_GET_DUMPABLE(0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8200, 0x16b) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x208, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'erspan0\x00'}}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) 00:25:26 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r1, 0x0) splice(r1, 0x0, r0, 0x0, 0x11000, 0x0) 00:25:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:27 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) [ 3216.439600] audit_printk_skb: 2395 callbacks suppressed [ 3216.439609] audit: type=1400 audit(1546475127.213:179983): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.447018] audit: type=1400 audit(1546475127.223:179984): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.458956] audit: type=1400 audit(1546475127.233:179985): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.460757] audit: type=1400 audit(1546475127.233:179986): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.486768] audit: type=1400 audit(1546475127.253:179988): avc: denied { net_admin } for pid=14767 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.501163] audit: type=1400 audit(1546475127.243:179987): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.506839] audit: type=1400 audit(1546475127.283:179989): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.521353] audit: type=1400 audit(1546475127.293:179990): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.526243] audit: type=1400 audit(1546475127.293:179991): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3216.530359] audit: type=1400 audit(1546475127.303:179992): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:28 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') gettid() geteuid() getuid() 00:25:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000040)=0x1e, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240)="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", 0xb50, 0x40400c5, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0x71e10f339006afa9, 0x40050, 0x0, 0x0) 00:25:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/109, 0x6d}], 0x1) 00:25:28 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:28 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast2, 0x20000, 0x0, 0x0, 0x0, 0xa, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 00:25:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = gettid() r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCCBRK(r1, 0x5428) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) r2 = syz_open_procfs(r0, &(0x7f0000000040)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) [ 3217.394561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.413945] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 00:25:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) [ 3217.477979] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.544816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.626730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.701645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.788926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 [ 3217.871899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 00:25:28 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x1b5, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x1, 0x3, 0x55b2498e, 0x2, 0x7}) write(r0, &(0x7f0000000080)="b622354af6b6259a60c24645b59550434460846918b95709068693104f7293e06b8f5ed593cdde5f49ca475f9fd5d6e606abcb0a3a0cd1dc795a9b576de3967992dc83caec8c945dc3f94ac9cc06350de0c5796eb3460c1d0eab5e8923803a482d0b9481aa642765fb8e983e43450594831bc25b0e27356b0fb542e91d52406f22d2e1", 0x83) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) [ 3217.949616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 00:25:28 executing program 0: [ 3218.048515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14779 comm=syz-executor1 00:25:28 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:29 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xaf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xdau\xaf\x1f\x02\xac\x06\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x00\x00\x00\x00') geteuid() getuid() 00:25:29 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:29 executing program 0: 00:25:29 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r0, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x2fff}, 0x28, 0x3) 00:25:29 executing program 0: 00:25:29 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:30 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) pipe2$9p(&(0x7f0000000000), 0x80800) 00:25:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:30 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:30 executing program 0: 00:25:30 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:25:31 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:31 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(0x0, 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:31 executing program 0: 00:25:31 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000000)) 00:25:31 executing program 0: 00:25:31 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:31 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:31 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 00:25:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x54) 00:25:32 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) [ 3221.446959] audit_printk_skb: 2433 callbacks suppressed [ 3221.446967] audit: type=1400 audit(1546475132.213:180804): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.464151] audit: type=1400 audit(1546475132.233:180805): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.468702] audit: type=1400 audit(1546475132.243:180806): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.474075] audit: type=1400 audit(1546475132.243:180807): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.476130] audit: type=1400 audit(1546475132.243:180808): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.492483] audit: type=1400 audit(1546475132.263:180809): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.506847] audit: type=1400 audit(1546475132.273:180810): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.512214] audit: type=1400 audit(1546475132.283:180811): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.521546] audit: type=1400 audit(1546475132.293:180812): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3221.523874] audit: type=1400 audit(1546475132.293:180814): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:32 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:32 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rout\xb0\xa1\x9f\xddO\xcb\xc3S\x94,\xa2z\xd0S^\xedD/\x1dp9=\x8a\xb6E\xbb\x89\x1c\x8f\x18T\xe8(N\xc5\xdad\xf0\xdd\xf2\xc1&\xe7\xb0\x0e\x8b\x90\xb5\xa4#\xde\x9aKS8K\xa2J\x9e\xb9J\xd0\x1c;\x17d\xcb\x8d\x8e\xa6!\xc5\xfb\xaaq[\x93\xfbo\xd9*&\xab)\xef\x1c%\xeb\x93\xd3*v\x98\x8bp(\"\xcf\x9bL\b') r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xb, 0x1, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x48010}, 0x40) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x54) 00:25:32 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:33 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:33 executing program 0: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x4}, 0x0) 00:25:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:33 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:33 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:25:33 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) sendfile(r0, r0, 0x0, 0x2000005) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c01) 00:25:33 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:33 executing program 3: r0 = eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:33 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)=r1) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x6801, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x39, 0x5, 0x10, 0x19, 0x6, 0xfffffffffffffff9, 0x0, 0xab}) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x0) 00:25:34 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x5, 0x0) syncfs(r1) 00:25:34 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:34 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:34 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') r1 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:34 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x20000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r0, 0xc018620c, 0x8000ca) 00:25:34 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) timer_create(0x7, &(0x7f0000000140)={0x0, 0x9, 0x3}, &(0x7f0000000180)=0x0) timer_delete(r1) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000040)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000013c0)="c9b2f2a275050cb200df0552bd022ef3dca8ba4856cc74406592a535029515bbbbfc64da33a055301f4bf78a58eb6df46e96e9f919c27f46bf27ae71332b97b1f2f8d4093fb258b38f7611ce3dddafd35977c46e36b3acffee13f47941f8860f220a48f80e4ce975797d7c3619d0ef7d052e3673aedb13c60d7d32c0f040423653f3b9e5cf04289690fb46c8b7a57799bce3f0d0dc639498b234000acaff68b35544eae9a4f02a259b6ab5987218d8c07fdb58a16ef8c031a3081aa664a24c9d6d4fdd79afb8253982892e2c1f204a6064c7e216d3749865258987450db9fe27f4da308674d5da0b8289a47047f7b1a82272b936634253c461bc1ea7b23dd99bbfe479c74b5f140d74bd4daac2fc5f625b1c471f44f0d56010ed2434702e3c6c7e92ee76d1735c8d944ebaf4fbddf90698aebe8ac1e4afe0c1d4ef1b69f236c02db9383397d20c4f62fa3f133cc1b93dd3b7f47f7a9a45542268a1387967cccbf9440a9799ac4c37701735c4158d003d67df2e3defb648b432bba95c0f8c94203f984c695ab657f670ea2c4295462313d5f123b6fc99764d67ef16509688fb08cb753d808324c3d19b073775a67b4b032e06c6f5aea8af4df6d8e52395897b2cefb50d21c22cb8b95f6b13b7c9a8e13ad05c49ec4867cbb66a8e86d5b7cce1c2ef1385fa3419d0ca5e1c43a10886c31fd711bfb0278a203edb36f26d0bcc4815b0a48b1af6bfd50834b2c5db17cb5c933cffba0e707d217780087a25147904b8106964a7a7a6368cf0d75e1f86c3e96d612ee394f4a1d4a13a397a27a2452076afcca985373ba60cdfe66affcfa56115e2446323497debf6f5551d5e23d45882f0c6596984874d463428bb5f3ba85ba974b48d61640eedb2c9164d385a2a48bc39cbb962dd45e667ff2a4501477c8103b62891652bd9fd161e1f5c606d2df8150baafb6369554d05c479bd542d455c557f90e474332f23b2e59080796d2d8a6e0d77ffd442971e28cb730efff38407815b2528bcfcd6f2c536912b04f70cde342e894219f171fe5cb1b0563d7b2e669ea5dfe4615ec9b183ff5f270da171391963c1fa64a152b0bba890ce6485e48cc8f10846f913b6f078104e592a7d6368c9e21a7869c795b7a401af3499465eda697ff380371b400c5c16781d6bd984ebdd4891b5586acead572bdfaac11e54ee43e869030dc88bff07c9fd8d1c3ca94121fa5b0caf825d8a5fb442ffdf5b8236b49f38e59e595ae85e34585d2b8d7814da3c632a5fd4c19b8100840a48155330e06af7567b478c26a83bef45aef47d3daebcee5c2938382960115e329921276bcbcd002976feafa96f6e65b237bcfa11559a8a287e21806793ca1a5495066d6af14d3cb4ee8a8a4c50e474cf1d8c88a4461aa88f837354cc63b063d4c14a1a1fb32652403eb367be664bc801ecc676363114e2606885229a4c8a37d4ce88ec74671f29b7a90c509fa7938eb364ee01117b7dfe290925cb6f50e3230622d25e9e39262c06c1d1924b21328784eb662821c97c04edb551eb0a6b78591925f19da4c2ef0742dde38a0d888d1d4cb68d666a9fe87384f9cd9d9334ba8ed9a4e8983c7d20b46a7c2ca4d50b682e6814595f3a471e03df8d4590e6d8359278e3ee77e576091ff71f00a962d5bb7aabac8e36cae0ad147d8db6ed99058ea5ee145456931ff32012a5a6232e1eb52fbd556d7aaa5b912769aefe4bf5de9829c5ede017a3860927eb8d8c0e3231a91853afc04f2aa4bc079e913471f24b7a297616990d8b5b6fac0dbb5d706bea820dc442ee43302b5d22b5a994006d82e0081c2e3222cbb6c2f8569497a9d57fdc0bb042fb125b81df1efefa412b796a1aa28da7e8f5836da1a6bb26df1891a6e10f28fd2fb093ccc36846f733cfeefdd289c5ff1accc6c6a961664b7e026e0acaa067ba962ab60784ea6ce32f9346b5195c82d29a1a2e5ba82e6c97b0be16a38313b8560851611f97991e3111e449d7bb9cc8af7333c8b93a9f3bfacd51ecfd5053fe5268da542e07be7861edae008db4653cc9017d79b24ab1224519b6f562031cc22abe96778d7bffd095033182e261b50f18d8a42e499477c5c308e6a92a36f5555265f5f2dfe93487c04e278f33b5b4616803f130949b1383e61d5b192d3ac0d86a94d7bc474acbd545f386d17d48b5a7e5695a0ffd2b8798b3583d70dce89240d82943786640ea777714ff3c9f9a31a0b6b06504a9be930d89848d7b5ddfe9bf1a2f8c3c9d1530292e7bab7b4209b6d073184f64ba1e03a7f95ef13639c5d3758b7650fedaa809c9ec6e194ff8419f6ef0a70a92d6313c937934cf3bd944cdc070d4ac95ab5ad2379263200efac789368bb5a68a884b9e5befc45d057c5f3f882ed794fc45be28548ce5d8bc65576a79f0ef0c9d44364a9b5becfa368eab011bca306b1c6126ceabefe3adebaff1dcc0aac2fa149842e57bfd3ad93ceb11cac9687713eb4d4d73040a54efbfdfbdafd944c94b6bfbffe0538869b0fd4bae6161ef9ecdd2dda919a139d3b760a8d328d52dc028f6b0685d717b6822a486ac050b146014b5a024953597ff4e1c0806ad8020f0ccca828d2b7703864730e6b7eee16106da0ac1b15c2542fb76d8f68655005928bae8ab4923eb869fe696fe4fcdf8bfb6487ac1ddd4ac3bfacc741642e201a8ae4206c0d3ff9d619543992c03f1e16a02028c71f53036d5a4ad39557bd274a866571a375115f916aaf5c7ef09ef86653b49734df091958ebfb25bd705243fa2fb9e5aa6a62473d38f53e28705be240f1ba614212ea22dcbef32b04feb2dd4b6e45ec6c49093665cadf9506ec2aa32c9fc2419ac3160178de184b0f788d9793d9c40cd25ec886dd15c40ed1032bb01411e1e7a73ba77424036693eb2b0ea2a626c18801c8fcb5fbaf0c81964c4955393c337b672af38f375aceb04063cbb1ee3b98f5e4a17ea583e7ea87852fe5b00e516e3acb3b615ebc62b157be69a1856e452366fa6d43442439d14a413b65fbf9530e50232771e69df0c7164dfb3f6b36219c546a649768804796ba95ca883bb2beb26a846ab4a77b260d2e2345ea4a891d007ac4a0502b9bb621f0a193f3beca435a2f52f677b4474c22637d0a6da639eb59f049251988bf47ff5ec20aa7bb0b6f3fa7803af7010e2ecdf4c232674aecb1aad7c465dc21b629a2a0cf41cab9ea8637a0a2096c825ca7cbbf318f8f935e86f86ac644a8c4fdbebe6001037100851d299868b4d401552a918a6447aababf04ebb63b0bd56d32e3b6df7e9b4ccb45acd897aa6eb3abb4367db770a408440168dd7cff8582b352d4ee9d716d0062495f7a4dcabbd1cf4ac2e3d883501d79fca3181deac940a9d557729602947fb08f5b1251318bf756e16fafdbc773c8c8c7fbd27956b90e99ad201b1f710e5be0b1376cf666a3b7f0d87539674af0a28a4abf8b5a83672234efdf991b99a223f06ae6bdac85da72a45b4313b16916e3f94145f1e4d3e535201e45b5924869e9e9919e72f61e166fdd486c0f40c2f03ac235ef9f9ba4c034dd1a525860b501408deb1cea71f72769497bf0fd48087c6915404007db15b368fdfd0bf44abfd087e5f7031e3d49df6df1b0f8e46be053477b304ef2c3f2cb0c114a4a68ba0ac029fbbc69763dc9153ea21c361ecbce217888398b9944d0a395196683db84a3ab4734e3c3aa68301586fb817b1ffe15ff04a43c0d6c4cac8342aed50ed1b4ebbf00319bde9abf49924d64bd3beb6dc1113725e750e3242a3e41f305fde1361800d8f1f4fb7739944a4835e47be06b734cc03a2c4a3d5197e5594bd8b30cbe8720a0b0eba8fa4695f4b5ee97a13747753b3792359e4db809d92ea6de2c9d64ecdf12dd4c5f96250c55dbc320e55bf38d77d5201b3df2dd6aa57ee024ef16951b4b3bed70f84a14066967aff317808ba6af4bd99aeb87bf22475304ff9df1aedbfc3b3368aa6f5ad18d77a04a1f7f61551d76b1d14103575263682d39a057b676981e42da6fe6830ee9dc0a30183f3afc720b16bd67413aa3a546e4cbcee6de0d98eb531e713c3b4e4d25f1b132431d14234ea5bbec3e70bcd8ea84aa4feb2101870f99b155a5c501809497d9769945fc9679cf368794c5cb1eff7058641b6a090dec8cd2cfe88d82ddda062983a561ea2054ea5ad27876cf16fdab1ad30951c873af19899697f80d69a4940ebc9b801ea4aaad6403b6d51fd69e9b361a4749ebf4fbb6fd57ef8f44013000067df864d8a597dad92ec8fcde1aef88e33bf4dd01d968866778245981129657655e465185cdd576ad0c52dd8b389e578f9c331a3dda9fb6c058881d8994fbae48134f6ab5bff58c795a8f434016bd85e5ffa1b7db3f0718504447217dc240b09948e11ab6b16a44326a0b9b4343c6e66c9878f43c3cfff63397e948620cfeb2e5c906ff5a76be3ba3165c41fea74b130da57d02ed9c0935b8da1988502ada9b8d9ebbcb8448f23fd8b42998901da1dee24220a40626822638bcc56deaf9c11bb6772fe98b719626186c04c93127e7409a0508490d315538be054ab89c56128f163ac11f40cd17db26f5e3348b501879a2e061873f2ed6367bfec300775d4b4bd72178085b131ae317d07c09cd95f435fdf7b41075b1a79cd650686d372640c3f4c3977819d20384d094d9cc3eda5e7f1a621cdd82367ec12f9742e8c2412725f8c6e3b855656cd5451e1081f6b84bc9cae5783c39d89d41dc1f7f9ba92bd9de6b41f33f3fa06f12464321a1c6fca2759fafee0c55e29eeb4c7c8e11f4baf3ba0dfd142f9388168ad1cb470b9fb501ee50e767d2eb85aa16d602713ddf665785327d16c210645dea76bc316bfbb858044bd5452263929bdcafcf4738826c17d1e7117d1d16113d3f9d79f7690321ee9cdaad453d7276d4a497449743066729a872dd121c6c4bd71114fc85f78176dabccef15bc2a65056d930ccbaf4b51fe7f1f04c266e1da8ee1cce10b48e1f66dda3bfe28b711647afeda2f06e0ed7979c2db9a359ae40da9c026f4ec7278434c15ba6fe255ffbb8eb9d2b688cd725e37e6d2ba5e22b822cd3d2d4e67c62bf60dc6d404000cfad512c6a2d24ad548326c85247c34a40e1d1a37660a50c5da688a4cd1a601f05089836c69a7a9ca2b46d4407c3e60173ca3b693be79f5a095a83027346310741fa233ed6e369d8d0a08b5359f1a0422d92d11223716555b1448cec4d84e434e201177cae3ebdddaf3e3c68e14d3ceffbd3cde6ce46ab5a9a7c4952847a5015b95a060760d786b25965f1d4d455d19c9fa430a277cae39695fa518a274dffdfffb875818feb3e74d6225c12585b8accd01ba8803f9d6a555b0256eeca3410e03c84afdf16c9837e9f87e082941adfcc16e2ac6db859a7b9af36cee83622b1fc66df96034a07a9f7537d96c3e796781d662d139412831e9d08374e6d115d9d3d214a68535fc197e6e3b00aaca38eb8486be2c834343aa93e6aea875cb649fbd3c002896e89d6c9124383f75c9990a1e838d71c2d075b6436db8d12dc5e79e0c393aa390c88d33a882c4a71b90b3a29e96cb7670873f4f3fbcf88ec451e4f69dc8bf63012ee42f100fedd2e6b578f881364927029b2e1606fa49bd0a208912b3945ee72b9234ac4cd5f456ff350818e8fa9317090d92c2e82420e77e025bbcdb488255e57888a3c1165fc51d6cca464c1f054066ff84c2caa709e8a605e3d90ad2072b7753ffed492d7b72a38d5ebb13df64db1ef7c90b0ec81b1767d5d31501d4e8dc750f50ce0fab0065", 0x1000, r2}, 0x68) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x1, "31c2637393bcd86a"}) preadv(r2, &(0x7f0000000700), 0x31f, 0x0) 00:25:35 executing program 3: r0 = eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 3224.311249] binder: 14930:14936 ioctl c018620c 8000ca returned -14 00:25:35 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:35 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x0, 0x17}) r1 = socket(0x5b413fdd1ceda996, 0x0, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x3, 0x5, 0xffff, 0x3e0000, 0x4}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) 00:25:35 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ppoll(&(0x7f0000000200)=[{r0}], 0x1, 0x0, &(0x7f0000000280)={0x5}, 0x8) 00:25:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:35 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:35 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='children\x00') sendfile64(r1, r1, &(0x7f0000000040), 0x3) preadv(r1, &(0x7f0000000000), 0x0, 0x0) 00:25:36 executing program 3: r0 = eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0xffffffff) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:36 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:36 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x0, 0x0) 00:25:36 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000fffffffe) ftruncate(r0, 0x0) 00:25:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x11, 0x4, 0x4, 0x7cb, 0x0, 0xffffffffffffff9c}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0af587003c123f3188a070") bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x711000, 0x0}, 0x2c) 00:25:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:36 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:37 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000340)) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/route\x00\x19\b{U\xae3Hn\xe3Cj&k\xb6=>N\xcb\n\xf1\xda\\%e\xc4j8\xa3\xf3I\x91[\x91n\x97G\xe4\xdb\b\xff\xaa\x94\xf4\xeaM\xf1Z\xdem\xd1\x1b\x93\xc5\"\x11\xc0\xb1\x14\xb0\xf8\xed\xe4~\xecM\xab\xcd|\x85_\xa7\x9c\xa9\xde\x8a7}\xff\x17\xe3\xd4\xc3\xce\x96\xbaR\xc2\xeex]S\xc6p\xcf\a*\xb1\xc1\xcc\xdaS\x18\xd5k\xe1=\xde\xd7\x95b4\xd4\"\x9c\xa6\xda\x19:m\xc5\xee!\x80\xbd\xedo\xd30d0w\x88\x8bU\x9b\xd5|\xc28\xd5\xcbY-*\xedA\xb8\xc2z\xfdvC\x83\x9c\b\"\x86E\x99\x03n\xe3\xe5%l\"d\x93\xc8\xdd\b\x1d\xb4\xab\x11\x89\x99\xb61\xd78\xafX}\rND\xc7\x82\xedH\x81\xf2\'\x02\x13\xba(\x9e\x19w\xc2[K\x9f\xed\xed\xa8E\xe4\x02\xef0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) 00:25:37 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() [ 3226.489741] audit: type=1400 audit(1546475137.253:181932): avc: denied { create } for pid=14989 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 3226.494419] audit: type=1400 audit(1546475137.263:181935): avc: denied { dac_override } for pid=14989 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:37 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x0) ftruncate(r0, 0x0) 00:25:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10022, &(0x7f0000006680)) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000240)={0x77359400}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002940)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1}}], 0x4000000000001fa, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x14) [ 3226.494535] audit: type=1400 audit(1546475137.263:181936): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3226.511663] audit: type=1400 audit(1546475137.283:181937): avc: denied { map_create } for pid=14991 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:25:38 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() [ 3226.534668] audit: type=1400 audit(1546475137.303:181938): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev}, 0x14) sendmmsg(r0, &(0x7f00000092c0), 0x41, 0x0) [ 3226.539061] audit: type=1400 audit(1546475137.303:181939): avc: denied { map_create } for pid=14991 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:25:38 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x0) ftruncate(r0, 0x0) [ 3226.541514] audit: type=1400 audit(1546475137.313:181940): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:38 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000000), 0xbe, 0x82000000000) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x1bd7) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/183, 0xb7}, {&(0x7f00000000c0)=""/26, 0x1a}], 0x2, 0x0) 00:25:38 executing program 0: futex(0x0, 0x8b, 0x0, 0x0, 0x0, 0x0) 00:25:38 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:38 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:38 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$netlink(0x10, 0x3, 0xa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x0) ftruncate(r0, 0x0) 00:25:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x41, 0x0) 00:25:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) fallocate(r1, 0x20, 0x0, 0x10000) 00:25:39 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:39 executing program 1: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ftruncate(0xffffffffffffffff, 0x0) 00:25:39 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x351500, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') 00:25:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 00:25:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) sendfile(r0, r0, &(0x7f0000000000)=0x4, 0x2000005) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:25:39 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 00:25:39 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0x0) read(r0, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:39 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f00000000c0)={0x57, 0x3, 0x5, {0x488000000, 0x6}, {0xe7, 0x2}, @const={0xfff, {0xff, 0x49e, 0x101, 0x1e44}}}) write$P9_RREAD(r0, &(0x7f0000000080)={0x26, 0x75, 0x2, {0x1b, "50e9f77b7d4c2b2484f655eb08b0c526e0bc9122f771c50015153d"}}, 0x26) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='fdinfo/3\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) 00:25:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000d00)=""/4096, 0x1000}], 0x1) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 00:25:40 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001fc0)={'ip_vti0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@remote, r2}, 0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@dev, r2}, 0x14) sendmmsg(r0, 0x0, 0x0, 0x0) 00:25:40 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x1000000000000803, 0x0) syncfs(r0) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb0100180000000000000058010000f40000003b000000270be86041bd0c5c0e4629334138a26674a166f7fd4335f871355441186beaa005c009c7980386cc794facd71447e7de22b724649c5782fe44aabf557b2333a433cfcb7ec187b02931809b6eb9a5f575f6c1b640e0a9478dc90000ee6c8613c4ccd61c376aee822be483955d85c773e1ad6b7cbcff8e4faa5983be2fbcd96e9baeb1de9e33e16974b9303658fb771d31a96aff8bd6bf573d01a1c307593ec00625136ce915b8e6061a7754fb30c3357ba6971f204c1b95aa4ee0036afb885c3bd164873b83b24f8821a467ac6f9b140fb4fb9c0a863ac736857be12c63bf0a35900000003a967f27280a4fe5a5e21445988756eb0627040bbbd6f6751e25af0e90fbc4dbaf699cab20367021b3e253b6e2c09f6a37681f6962e27a4c8b28ee8bc883cc1e3057c1c64a6b2bb2dd83e986205b2669d7b3a3df34625445c8867b55619302b3b4a527bce8c542ea3b2d8927deccd32bddbfe525b5a34dd18566352342a01a46ac95cbb1f8ea2afcff808f7e848accec3274b576aad5a8dcb5a64a7268aac768e551558d1568bfc39d85cbd8242ecd800968e17ff910595e9516c033671be1401e48b4d22ddcecf3ef705d82c43d6e25001ab3f62ddc0eede60cc174346cce160ed8c2069496bcfa0fa00e622a5143a756e5d2862b0f95a332664f6767a400"], &(0x7f00000013c0)=""/4096, 0x1f4, 0x1000, 0x1}, 0x20) r2 = fcntl$dupfd(r0, 0x406, r1) write$UHID_INPUT(r2, &(0x7f00000023c0)={0x8, "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", 0x1000}, 0x1006) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r1, 0x10, &(0x7f0000000040)={&(0x7f0000000100)=""/199, 0xc7}}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r3, &(0x7f0000000000), 0x2000000000000189, 0x2) [ 3229.756096] input: syz1 as /devices/virtual/input/input313 00:25:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") readv(r0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/15, 0xf}], 0x1) 00:25:40 executing program 0: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x0, 0x20000000000001, 0x0, 0x0}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x18b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = creat(0x0, 0x0) futex(&(0x7f0000000340)=0x2, 0x8f, 0x2, &(0x7f0000000380)={0x77359400}, &(0x7f0000000640), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000500)={0x5, 0x5, 0x0, 0x8}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setgroups(0x0, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) munlock(&(0x7f0000007000/0x3000)=nil, 0x3000) keyctl$update(0x2, r1, &(0x7f0000000380), 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000680)=0x3, 0x17c) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) poll(&(0x7f0000000280)=[{r2, 0x1000}, {0xffffffffffffffff, 0x61}, {r0, 0x100}], 0x3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, 0x0, &(0x7f0000000000)=""/55}, 0x18) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000240)=0x4) readv(0xffffffffffffffff, 0x0, 0x31d) 00:25:40 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') pwritev(r0, &(0x7f0000001700)=[{&(0x7f0000001540)="bc", 0x1}], 0x1, 0x0) 00:25:41 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:41 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0xfff) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f00000000c0)=""/176, &(0x7f0000000180)=0xb0) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) close(r1) 00:25:41 executing program 1: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9cb4d5a80d6eff37d2ef4d66ed6448d77cdee2752138e76119b4fd2620860d540b672cecaef18fade2baa305f804fbe167f281ac16994c23cfd547a5627605db", "b287612eeb8d0930027750444d40f720d4e61476957c9193b2ef85bfe4799af3"}) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000b00)=[{&(0x7f0000000780)=""/110, 0x6e}, {&(0x7f0000000800)=""/238, 0xee}, {&(0x7f0000000900)=""/136, 0x88}, {&(0x7f00000009c0)=""/2, 0x2}, {&(0x7f0000000a00)=""/61, 0x3d}, {&(0x7f0000000a40)=""/138, 0x8a}], 0x6, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540)}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x0) 00:25:41 executing program 0: 00:25:41 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(0xffffffffffffffff, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:41 executing program 2: 00:25:41 executing program 1: 00:25:41 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000100)=0x9f0, 0x4) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:41 executing program 0: 00:25:41 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, 0x0, 0x0, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:42 executing program 2: 00:25:42 executing program 0: [ 3231.490786] audit_printk_skb: 3617 callbacks suppressed [ 3231.490796] audit: type=1400 audit(1546475142.263:183148): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, 0x0, 0x0, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:42 executing program 2: 00:25:42 executing program 1: [ 3231.509311] audit: type=1400 audit(1546475142.283:183149): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400200, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/148, 0x94}], 0x20000318, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) [ 3231.511274] audit: type=1400 audit(1546475142.283:183150): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 2: [ 3231.553048] audit: type=1400 audit(1546475142.323:183151): avc: denied { dac_override } for pid=15125 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 1: 00:25:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, 0x0, 0x0, 0x10400003) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() [ 3231.553909] audit: type=1400 audit(1546475142.323:183152): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3231.565275] audit: type=1400 audit(1546475142.333:183153): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 3231.567653] audit: type=1400 audit(1546475142.333:183154): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:42 executing program 2: 00:25:43 executing program 1: [ 3231.579658] audit: type=1400 audit(1546475142.343:183155): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3231.588770] audit: type=1400 audit(1546475142.363:183156): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3231.590783] audit: type=1400 audit(1546475142.363:183157): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:43 executing program 0: 00:25:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:43 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000) 00:25:43 executing program 1: 00:25:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000000)='task\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:25:43 executing program 2: 00:25:43 executing program 2: 00:25:43 executing program 1: 00:25:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:43 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) 00:25:43 executing program 0: 00:25:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_adj\x00') writev(r0, &(0x7f00000004c0)=[{&(0x7f00000002c0)}, {0x0}], 0x2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) write$P9_RREADDIR(r0, &(0x7f0000000540)={0x87, 0x29, 0x2, {0x7a6, [{{0x7, 0x1, 0x3}, 0x8, 0x8, 0x7, './file0'}, {{0x21, 0x1}, 0x7fffffff, 0x0, 0x7, './file0'}, {{0x20, 0x2, 0x8}, 0x1, 0x4, 0x7, './file0'}, {{0xa8, 0x0, 0x4}, 0x1, 0x400, 0x7, './file0'}]}}, 0x87) 00:25:44 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) read(r0, 0x0, 0x34c) 00:25:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x0) readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:44 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(r0, 0x0, 0x0) 00:25:44 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x35ac, 0x1}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r1, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xad}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x1, @local, 0x100000001}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x801b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2000}]}]}, 0xb4}}, 0x40080) r2 = getpgrp(0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000040)={[], 0x1, 0x8000, 0x8, 0x7, 0x5, r2}) ioctl$KIOCSOUND(r0, 0x4b2f, 0xfffffffffffffffa) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x0) 00:25:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/snmp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/252, &(0x7f0000000140)=0xfc) r1 = open(&(0x7f0000000100)='./file0\x00', 0x140, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="cb7c0d4b59d04cccffc9f5c3a829998b7e142b1852cc654684de44fb3794d437c9faa2c92689781f9aa92dd07a57a19d38e9cf759e8da5c6ed3decbfcba26def3b2b96b0777b7f51ce42ea6157c4d0081c3177cf803f7e0d138e61a2b9adfbccad", 0x61, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r2, 0x6) fstatfs(r1, 0x0) 00:25:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) geteuid() getuid() 00:25:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)={0x0, 0x4}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1) 00:25:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_targets\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) 00:25:45 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000400)=""/119, 0x77}], 0x1, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) chdir(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$peekuser(0x3, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:25:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x22}]}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) connect(r0, &(0x7f0000006540)=@nl=@unspec, 0x80) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 00:25:45 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x1d1901, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat6\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:25:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002e000000bc000000000000009520000000000000ca5ea71a2d0a2c81ee86059a904a150b478adfe30fe4f0ddc9d9cd51977f48e6da3c5344480019e698ea000000000000000000000000000000"], 0x0}, 0x48) 00:25:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 00:25:45 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x9) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 00:25:46 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(r0, 0x0, 0x0) 00:25:46 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/37, 0x25}, {&(0x7f0000000080)=""/44, 0x5}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x3, 0xfffffffffffffffa) 00:25:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0x40000000000000, 0x0) 00:25:47 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, 0x0, 0x0) geteuid() getuid() 00:25:47 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') 00:25:47 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x100000000200, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e21, @multicast1}}) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$getregs(0xe, r2, 0x7fffffff, &(0x7f0000000080)=""/43) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) 00:25:47 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x7}) 00:25:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 00:25:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000280)={0x39, 0x6, 0x0, {0x0, 0x0, 0x10, 0x0, 'coredump_filter\x00'}}, 0x39) [ 3236.512745] audit_printk_skb: 3081 callbacks suppressed 00:25:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 00:25:47 executing program 1: mkdir(&(0x7f0000001340)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 3236.512759] audit: type=1400 audit(1546475147.283:184185): avc: denied { dac_override } for pid=15267 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:47 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') sendfile(r0, r1, 0x0, 0xffffffff) read(r0, 0x0, 0x0) [ 3236.521228] audit: type=1400 audit(1546475147.293:184186): avc: denied { dac_override } for pid=15266 comm="syz-executor2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.529082] audit: type=1400 audit(1546475147.303:184187): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.531105] audit: type=1400 audit(1546475147.303:184188): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:47 executing program 2: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000440)=""/246) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 3236.533315] audit: type=1400 audit(1546475147.303:184189): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') read(r1, 0x0, 0x34c) 00:25:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) write$P9_ROPEN(r3, &(0x7f0000000100)={0x18}, 0x18) madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x9) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) [ 3236.535287] audit: type=1400 audit(1546475147.303:184190): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.536501] audit: type=1400 audit(1546475147.303:184191): avc: denied { dac_override } for pid=15268 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.551081] audit: type=1400 audit(1546475147.323:184193): avc: denied { dac_override } for pid=15266 comm="syz-executor2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.558933] audit: type=1400 audit(1546475147.323:184192): avc: denied { net_admin } for pid=15269 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3236.565984] audit: type=1400 audit(1546475147.333:184194): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:49 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, 0x0, 0x0) geteuid() getuid() 00:25:49 executing program 0: socketpair$unix(0x1, 0x2000080000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x10000, &(0x7f0000000300)=ANY=[@ANYBLOB=',\x00']) getdents64(r2, 0x0, 0x0) 00:25:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0xff7f) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x9) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 00:25:49 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x2000, 0x0, 0x5, 0x31}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:25:49 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x100, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) write$P9_ROPEN(r3, &(0x7f0000000100)={0x18}, 0x18) madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x9) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 00:25:49 executing program 0: socketpair$unix(0x1, 0x2000080000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x10000, &(0x7f0000000300)=ANY=[@ANYBLOB=',\x00']) getdents64(r2, 0x0, 0x0) 00:25:49 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='\\7\x14\xaf\xb8\xd1i0\x96@\xf4e\f}B\xa4\xd0j}m\xd1\xfb\f\xf5\x8f\x13\x9e/\xe4l\xdb\x12\xebs]\xf0\xfb`C\xb5\x96\xa0\xe9\x89\xe8@\xbc\x06\xa6,\x0ek%\xca\x8b\x02S\xc6\xbb\xb7\x86\f2\xb78\"\x9f?\v\xc3\x04l\x9e1\b\xbb\x1d\xb8\xc7\x1b\xc2\xc9\x11^~\x1a7jcA\xde\xe7~Qq\xa85\x87\\I\xe1\xde\xb0g\xff\xb4<\x11y!\x97\x84') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:25:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0xff7f) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r7, 0x0) read(r5, &(0x7f0000000000)=""/250, 0x128b9372) write$P9_ROPEN(r3, &(0x7f0000000100)={0x18}, 0x18) madvise(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x9) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 00:25:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4f22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) seccomp(0x1, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 00:25:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/202, 0xca}], 0x1, 0x0) 00:25:50 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:51 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, 0x0, 0x0) geteuid() getuid() 00:25:51 executing program 1: 00:25:51 executing program 0: 00:25:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x20000000000000cb, 0xfffffffffffffffc) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x0) 00:25:51 executing program 3: 00:25:51 executing program 2: 00:25:51 executing program 3: 00:25:51 executing program 2: 00:25:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) 00:25:51 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000001c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000040)=""/148, 0x94}], 0x1, 0x0) r2 = epoll_create1(0x80000) ioctl$int_out(r2, 0x400000000002, &(0x7f0000000000)) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x202000, 0x0) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000200)='\x8clFp\x93\xa0-Re\x00\x11\xcf\xeb-\f(f\xd6d\x1b\x0fj\xfd\xe6\x195\xa0\xe0\xf8\x7f\x10\x9e\x03+\x1c\x81\xa9\xe1\xa3\xea\xa5G\xb1\xa5l\xd5xI\xecj\xda\x06\xcb\xd8\xe7(*\x04\xaa\xdb\xd4%\'e7\t\x83Q\xdc\b\xd8\x00\x00\x00\x00\x00~\xab\xd7\x0f\x9d') preadv(r1, &(0x7f0000000700), 0x190, 0x0) 00:25:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=@hopopts={0x0, 0x1, [], [@enc_lim, @enc_lim, @ra]}, 0x18) sendmsg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 00:25:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x803, 0x3) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x9, &(0x7f0000000840)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000a0030000280200000000000008040000280200000000000020050000200505000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f00000000000000000000000000000000000000000000000000028004d41524b0000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ac5b10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a454354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800f000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011604345430000001f76b6fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000434845ed000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff008aa776f630cf5e7b48bddea3dda54e0d2e18b000344f1de44db1a78d4ee1e89367cd28933cf0464ae276c735d78872794fb31ca34d65c023d41e15b6c4e0892a199f4bebf5e7e28089edb1ad844b2656fab0166fd5bb0b0c0000000000000000000000d08ded2557cf3629c9676768bd8c39ac673585eda49f83c241a0412162ce3272363bbd3546dde748e03ab71bf0676cbf6a9ec01f095f07e739cd13fe9ed01df16077f3d41cfa361d60b41f0e7a474fdf6cb328670718faa31b74eef106b5d3b8a06f5ce3769c64c655f956f0b041575f96e0431743a7b799de5ebdeb117f3ca85e4f62ac62ef0ee09dce"], 0x1) pselect6(0x40, &(0x7f0000000400)={0x80000000, 0xfffffffffffeffff, 0x1ff, 0x1bef, 0x5, 0xfffffffffffffff8, 0x1, 0x75bb18c2}, &(0x7f0000000440)={0x0, 0x5, 0x80000001, 0x5, 0x4, 0x62ee, 0x4, 0x80}, &(0x7f0000000480)={0x0, 0x0, 0x4b2f, 0x4fc7ca62, 0x3, 0xaae6, 0x919, 0x7}, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000540)={&(0x7f0000000500)={0x1}, 0x8}) 00:25:51 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0), 0x0) geteuid() getuid() 00:25:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) shutdown(r0, 0x1) 00:25:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6}]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 00:25:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x60) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000040)=0xc) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:25:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) 00:25:52 executing program 2: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc), 0x4) 00:25:52 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(0x0, 0x80800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc), 0x4) [ 3241.516697] audit_printk_skb: 2574 callbacks suppressed [ 3241.516706] audit: type=1400 audit(1546475152.293:185056): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:52 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x2) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x80000001, {0x3, 0x5, 0x331, 0xff, 0x1, 0x3}}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) [ 3241.546975] audit: type=1400 audit(1546475152.293:185057): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.556732] audit: type=1400 audit(1546475152.323:185058): avc: denied { dac_override } for pid=15428 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.559790] audit: type=1400 audit(1546475152.333:185059): avc: denied { dac_override } for pid=15427 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.568208] audit: type=1400 audit(1546475152.343:185060): avc: denied { dac_override } for pid=15427 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:52 executing program 0: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendto$inet6(r0, 0x0, 0xfdc1, 0x0, 0x0, 0x0) 00:25:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x104) 00:25:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240)="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", 0xb51, 0x40400c5, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0x71e10f339006afa9, 0x40050, 0x0, 0x0) 00:25:52 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) [ 3241.573267] audit: type=1400 audit(1546475152.343:185061): avc: denied { net_admin } for pid=15427 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.578454] audit: type=1400 audit(1546475152.353:185062): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.580568] audit: type=1400 audit(1546475152.353:185063): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.582616] audit: type=1400 audit(1546475152.353:185064): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3241.601058] audit: type=1400 audit(1546475152.373:185065): avc: denied { dac_override } for pid=15427 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:53 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0), 0x0) geteuid() getuid() 00:25:53 executing program 2: 00:25:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/143, &(0x7f00000000c0)=0x1ba) sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 00:25:53 executing program 1: 00:25:53 executing program 3: 00:25:53 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xc40) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000007c0)="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") preadv(0xffffffffffffffff, &(0x7f0000001380), 0x21f1, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000700), 0x0, 0xffffffffffffffff) 00:25:53 executing program 1: 00:25:54 executing program 2: 00:25:54 executing program 3: 00:25:54 executing program 0: 00:25:54 executing program 2: 00:25:54 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)=0x6af) 00:25:55 executing program 1: 00:25:55 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0), 0x0) geteuid() getuid() 00:25:55 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) io_setup(0x5, &(0x7f0000000040)=0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000640)=0xffffffffffffffff, 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) io_submit(r1, 0xa, &(0x7f0000000980)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x9, r0, &(0x7f0000000080)="ce839e7f46aa8fc8af61", 0xa, 0x3, 0x0, 0x0, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x7f, r2, &(0x7f0000000140)="8fae125ced8089fb8c4ac7a8cc8bf6c2b49b17fdb6c3944a3f6ad3033727df81fb3e0155e00ef4cc099bf87c2a9528d58252bc47e0d0bb69e566f80baaa978a3077a23231203d8fafaa0d6b581107e39c15626b57e4793f8b10cb2b6ccc0df5553b3e4615e116a6a5dce223927482083fe5a0e567060", 0x76, 0x0, 0x0, 0x1, r0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x2, r0, &(0x7f0000000200)="a0efbbcd7c47b952efc3fe56267e25d6bb41239b946ed7f0bc7236066b48345ef3a8945972ac324a0a203e6b1e535fd83b0d24abcc02d0dfc232ec6c5a07325d82acde576e929e02dedaa6f0e062ff68adff37b6358599", 0x57, 0xe0000000, 0x0, 0x3, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3f, r0, &(0x7f00000002c0)="615e439d88449cd64f0e49568709a641daef9317ca24c15e9dc6285f2d7e143ee05d0eae1cfff416456637b7f95712b2904811dd9ccaa6c4de1dfb3bbd10f818b28092948b3af16c16c4671eb6697535100b444541e433d60ff966610887755aa1283290724e1764d48de3689617a13bc6fe44f12076f7de380bb2475268c0024fd5efab1faa1e417d5f945382e893478627c3310491de41562d06d85df6a6a173f2ebbb601e90646e8881d596ffd9a8e8d56a34190c774de739d7b94ae68720", 0xc0, 0xe50, 0x0, 0x1, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f00000013c0)="80b370c1c9a1e6bd944ac27687f745c87190a1f29e7fa5451a92fd8be9d8c3ba69880eba25298b1030689f0e955ac5197adaa473b140dbaaa5ede2d42c65636b895470de933cfd7a35a2a79f686c49c7df7329a4078fbf98a9ccd69d95dd4602bdb0c3a64ae4755f28e7f489e7dc912525ecdfd188dda79071ffc427aa8d5316311357f5be0b988f0de9b0becdd2ae0279063d39efeb679c6376853e4355882169ebf8b02f9208e0ea9ca18c070e8d0503994890bdb9ba55a42a55c8ba20670f76a5fb961f81216307b912efc090ee5dff1275ee346ca4f86d16eb5143c4dc35b9f75deb12523338575333c06e6b3731c8a157e7ddeedda4537fda50809c8b69817248429e9069a1eaf645c0607092934c3a065f84c8f70d3bb9207db8ab92da3649805d64d585108e4ef1f0337e3236669bd318da6495aa638f40db1cba05921c4ab967a59dac35b2d74b65810bbcd2fd28564eb93a2cdddc350a559e9f227f4c783aa311032d85cb04652c3f6567e54f5d62292d5fb4c6814e5970c767bc38525fad4030cc7b2fd40dd61335f3e3db1fd75432e4522363b3ce484e85f532db818e451e97fe9a839c588ccba47a0d82797c9d88f84170a4ab906080aa02494a15fcb2fb10504e458f96976c8c213f1e79ebdb0ca164c663473b9022e927f1f7e4756d161666fc1646857abfde262c724c5b3224e9574453af4e316ccb21b2899988a3a6bdcd9afc4f71c057af15ef0d5114bacf6961c26d33c9379bee6749f089f3db7a516f83572bcc1e8f06398028d90ff26933ce099f1c059cd9290b377c1cedbc3143549a81481f1d55a2364ef251f1c254575d676d23d249002a97103d866ee920ef9ff8c0289eac924de467940fee6bd822b7494718c9904f05021fd06e5d178852b96fe52e215defcb8d813712f7d25e800b77201db7e20278995e6c2f8fb6e76ee1cc58055b6eb0bacfbc114faa324dad5697435072f522a8eb7dca323d23e86c6ea0988b9f1a475c3b286e37f4cd3bd8b7e0bf4553bd41f9e0387031d0e199173af3d34df8fa5df497296bfe22ae5d027e03608cccc4be156748965e450b61b6f2372eef51db387a5826b623e219616078223e27a4397b77172466b34daada508bc5ca2746b9f72bddc54802fee10fe7f668f06e161d6153e36f3a2036fa05bc660661f250c50b44613d001d74d5992020f8ed00226f9ef12d9fcf659a3361e5c1ff52636893a970bd2b5c788ccd6de8e7ad337a481c643de0be9edd904ccfada8c7d7960ab9c3cd3738866c4276f2ece764d3746ffc79aad0209d82cc5e78fc2d4029f8681c630d356c5c9486de70229bbfa98e0fb00d50dd4e098a894e4350dbdb6248b59f34870fd1cd2795665048213421e6e510e2af19737acde435fe0753e7b5cc1b67f234dcbb57488603c5ec3b9da6a295467f522773abf94440455b9c029fb81997693822e9c212fccd04a32796e3bf50d1853bc3a33cb2d6dd2ab1aebdb2d4be10c69db6369d528e594c3e17ee0d05b768a21e1dd4aabd7015f876e30caf76e8d6fb887f55bb96525be45c00b9b6af24bc902cf7ead788c11b9267ba1d475fc1791fb4e13af1e31f699dc3a72e331b9b048111b9adb45054071fdd6c3ed8ff98d7239ebe0997add0f97f9db748e4dc33e3e3cf04b455742873b9468769acf292c59eaff8c3728e4521b6d6639a63fc416846fb1e73f2ca7da6cd0f1a5ce7473aa1fef1b8715df7f56271fa9a23f42bd804a437a7e03f2b3f1db90ab807634244d4db6f30508672a043b5097e74046cae1edf8c9348ebe7ff6e72a7b994a2011145014e0f38c3562b91ee9bf2e05312ae3b4054b6ed1cff35e53a7243bf2282d9982ec06332db318011b6e2916d0306920009a6d527686e3328718631eb3c0500155d3a4888d3cc6bcd17777944997b3aa6eb62d016b401a1b412d6942ea9078a5c36e953ad0eb9a2227b0a89f945ec993cf137d848ee3e8efaba2888725679d4922f5ed601b0b33163ee15455cadef1dfa2b060df829cea8d5b6e6a4183a34a23e28440c04d2c949c294da3f7569cf6231b6cb4fc7280cc2a60677d5b6fdcc90ead904267aeb7f98eb8fb5bc4ed730649fdedeb0564eed44c51019c271b9fee59cd2dc702d4c82a13109a16e8b7bd23fbd7eac90cdd252d1193fe34aa86c6c88122c15f8f0dd71c56f900d676222b1b21e95de9c19c34ca46fe2c977552808b1e3c34f258315b166862d5ba764a60792bb474734de00bf667e190ac9463a1f6d8534e5622c70ee72f914ac23d78dd14c7f6885aef482170db029b47a19fcb213a3df0e4c9328b0cea657396d77eefad81098fa8d8f60e497ccd429c83bce03fd60d9a76d769a7c98da38d11795780ee277b14d3380bf21c92adad121f4d395c61882ab5cc98f7c298c32b69f5ac85ef1326a1f2fe38d94e4dc294ff887d42a4881e5980640ab48765f69aea608d298d011fc92b1dbca3f86b7c8fbf4954e7008873d9de748031fe7c462c761a74dece1c96bd791c6a174f65b77910a1b7e0e97dd6d766f025b177387efa37daea5add5cf0d4a88eaba5a18937fab6a4faa5c53b0104d4ffa11b9ae15697cec6b81010d561a6b2f65ae54ce1f91e5620aa7eadb6e2b7797ba50a1031c87987ecdb3e83e4d11c82e4e136f5ce4a1cd40c5d89e164dce77be714bada9fb4c1c95cd2caaee53f796fb68935e9508199bf88ffac79207d0fb2c68c0e1f64eae6697cc4261040607aecfd6e5cea5096169bd539b782340b1fad5074d2aeee1a25416bb700d3cb17b53c110ca31303b63c6e5496253bb271cbdcd3d9d2fb660e7b2483d736e6639b8bee0f57f39423188f220fc82a62b0070d294628ffca374cc0e58a1846b6a338e4b951017acf49daa07e09cdcf02a090e78dc6490eb368a35b70673eae03f4ea9bc3e980f1ebe7affc5597a7a3698aed333c5746a5246a7483cf9427f0efb328ec0a49ee8557ebe2f2ceea669669ee0328b987ce74f85d8c00071dedce6a85a1abb446a0d22ba42ffd141eb3a3bfa6b620ab80bbfd9deedf2083062778abdac2c6b9181bdef1c8cc5c371bdd6dd8eb2a31d191019f9e5c364c0ff9f968d83da4e05da2d28275f0f5977acd1ecafe638ec69da3fc457c8b9b584414a25e7f78bc560ef581f5adb18951c6d126d83b01cc0c7e6e9c199d78875d03ed3433b635321aa4d2e2235fb8a89afee174170ce40e126347b7117147b03a088980a641edd4da352548358277e46ee032b374b83ecdeea15258c403826544962a8facd2295293d5b69f874c760d92e3edb9e336225e6b0fdeae1857e2828a5cd2c134a479441850e90b4f00a0fa33cd147b2889639cf7609a8bdd019e08691d33c934b2f09b7c4513af1deabfd69cb1cefed74c415d18abda08180a9a9e67d7fe6980f0b07b5ebf57366d76c5e985d57dabfcb3bcdfa7b65a23a6c058609b22ef2bfe434a91dd382c865e81877a8c7caa78a72fbae52e5bf2bce2b43e7a8d74460b92afdf7011bb8eeae213c6987f64a1ae93c35c60383d13a05c85628342ae999bd5bd7a8b2bc2f794857a1f1236d5f389bd642344f4e120d0f1883aaf1207c31784577d5eeb1fc1a4a172176e5c0f423112da4d0d723aba07f7239c9d25ca9743873fdff3fa0fbe056bd7c9cec3a93c4fcb5f43f53f77bf899afd5ae13226cb24a056d1ae3c7a57c2424b7071a49a150d23e4bb867d5e79d8d5865d61efbde56b21cbc258565862054b16dc3e8672daf2cbe543d829328e1262868e1b5703f06d02dc26ed20f23ccbf40faa86e40f7fa1c31bddf3b7b605fc6ac7fb59a919fd7e9bbfdc98e9e1a4ef8b82b35b2f75998595dc46634b64f6a18ebc0d97719a5a78d32cd166a974fcc4d886e43b9e9c27f9bb4966002ba2777c88d0e2e72b859c2a4a6e8613194048f2a22551ceba6e8c0774b0d7ac5cccd49722e1a05b1230df6c51eb09039297c3b346f27dc219df168e05f7e643fc9f0c17112d1d6fb260b1a0a09b86930c77bcafa5a8acfe6406f17f8e990bdc6268abd792d46f16c2a0dd600600916e9a0259d2e953a5e5e023aad2318454e4117421794389fbaa7a2e2abb4f11b985cb9296af5b4d6acc5212615a136099b109b8a13618dd8c20d4b10287d4f537e7bddfd2056ed88410ff34cdd393352a91fcff904523d68234e3c6c0b4564c5fe64490b1550d0bc22f26bd8516080f5cc3f9746d71e1299b2c68633ece389677b2a86f14049c3e92aa49309931c52489ea12837d14df63254c039d05b8ea7bc4b4bf72d8d4f35eba78bc992188ddf74e3dc97373ffc2fa85ece1a99a8a4abf42b4d489432318ba5c2cd7ccb9768c0cd0276f9544a677856cfb466feab93de578080f7b89fe3ad7b58cd4540f4563fcfbcec010180925083bffad0da2d73cf914279f69fd2141b1f6a5fcc63a8ad42945865fcae34b5b13f2b7fdb33b3f39aee34ff3d328c2eb5ae847b9cc6f3d958c1f3bb075aa8dc2f7ea9096f955f899e35483b0b7be0d1dd29c5fca10f0cde718ea675f6d696cf2b9c9b647ba596e3a74e3570c44c1d280a44826cef8c3f49901d2cd44ce7986db5a7da1dd0c28b6d1ca67b31c6b79b898cd68219f3365faa38c7e90f53681768b1a49e9be39adac0dec01aaec4f4f611489fa095b833ed8c4c86f7c6ac56f33acfeb85382aa17cd48ba90282f7e52ff827645b5528b2f205691229e19db3ac1ef1641cdc722458ca36d7379ac6c6a1d3d5bc0fb977e5995f293e593aa76f812cf1dced102608e59b3fa10050f1912ba3e86d6f65e3905278814a570f463f11012e21d08e6dc228c75dd3ce81e137e2a3dd8e60c87144141272ff2dfef0fea39eff8ca9ab86b6d1fc92c2f1ba36d1540367ff64ea79878e48195cfb6ec5c8f40e18cf95f00a77106ce78878479a93042c098afb9d9e29c9af29f58f4db3dce056c7c4ec254f9b4030652879e6feb6dc4d44626cfb44e663c176b7b616bbda1828624ee3cd291cb3aefeb642c70c73be05f0f3b492e7c1d40d1288dfe9a8c84734796beddc01c37951524beb40d2c1a7c3f6f2ddf1117b01fdca57e99ac8cf034292da2be28914967c6de43dafd2ddfc70071c08b0e60640aa12d4785fd1981498052a7c4989d374411b758a506734bfb6189967b7a33f96c50f227d9788318d5b4b463b89fe8b35fd6dac979fa379709ca6f0ee4d59042be9956049c8d62c9e5bfaad43c7c71cd7f269f27f25b68fe1511a5859efeb7b0c11cb4eaff3bcb764a58626f934c4a6fa5dda5cd5f20e98dd102d822f6153b32452013fee74f5cf49b66b340ad6d1511d639d5df5cc7f3f0b95054c3f89ec427599f259e48040a7930ccbee6cdc91a46f02f6bff3c2919cabf651274b84dd36fa253da42c399ea343eaa28c572f387ea47b5b48f8a435c6f05178fcd8dd69410d096f7f1f37286b2f5d6ad010aeb39ce91ea34589b0526458901814f31f18e8bece4356f49017ea46ad14a5b7ec4ac1c61f6b2c833c54c8aa5c38a5bf347c765fc0c7123c36a75b6f8fa19ed192592014216e12a4757db829b4bfa79c643cf1919e10968e355250976201c3cd6171b2ce61c0ccfa108f77ff74170a66baac607c0130c22c269537bcd32d08697ff8d1164cb2cc9fa184e75a4c12f68bddc4161e7ba7316b1c3120990b31fe109c247b7a8225d0c1d0acd8722644ccfd7b1ae5638f63cb5be5cb23de0b21aff7c63fbd3f075ce3141a5295aafa0b30d8e5631fec895ef22eb88b86aac4c6e71755fceda2e2adb5ecc7cda2cf4d", 0x1000, 0xe006, 0x0, 0x2, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xb, 0xe6, r0, &(0x7f0000000400)="d7cc5494175d60d5595b458a6a8cbbdefce11d3bcb97bc85861e0004d6ef37a1c8379ead1eced9a74b162b059cfc23c72682c1f8f6c8b20bb2530ff84e1e66817f90e30e5b1dde7958ac6d4481fabb8feb892678d26dfe834d4660134fc09e7e0a74b367b25ce136382ccca8a310059e9453ef8e20a29777ba13945b55eed56d95bf0dbf8f96266e306428d21142a6934e7f8a68fa148c273fd10f95a2bd40fc1f4b6aa14f640fe36f9997fc4b336dd48893c497f2d7cc81e2f11275ad75f8", 0xbf, 0x1, 0x0, 0x2, r0}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f0000000500)="34e43c516896d846f5486b08213fa4229b2ae19616593a817f74fb477665cb2b66b815eb8cab220556ee0e6aee4364cc1669a6c4821185622bb45ef80419541fc91bece13661dde22981be5335f0d461b1bfbca347c091c3f9f8701c52992a22a0ef4bf2f6ee7520a003eb0305ff37312aea7b7b27ab8937912d447ff779c0230308ffd19c1112d0820aa10e37a1b15577de5d4a59fdd54435f6be742ed1c80db975819552ff48ab5ec9d066ede069aab4f1baefcbe48f733f27192dd3b1053813a5e1e0fcc6024e30b2bc7cfa982422b674235f2d04be03c980bd1c70b125dcde7f280ffcbf", 0xe6, 0x400, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x3, 0x81, r0, &(0x7f0000000640), 0x0, 0x200000000, 0x0, 0x1, r0}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x39, r0, &(0x7f00000006c0)="ba093d9e067ffa8fe1aa05c896864c8339c998cdd2fc1c2dcca9f69f48e131bb3b6f7c1db53a11177ee58e78464e81a7738cfa27c4fa7f7eabf6189e894e788d5e7394362feeef51714a1f0a16b84c71620fae04db42c77c95757831209748d980349b6b6004e6c25bdd584f1a7f4893695e58ef0fb1a0456da6f427377377e3333a909e9e7cd4a4dd4308781323e57b1d9276c76f2d20c1c62ea0ec1cfec3e9090d31660f032236744bb22a5de581e962dab855edd7562b8feaf81b726816877320cc82c8787de76f7951e75d08ab27cc20015edfca", 0xd6, 0x1, 0x0, 0x2, r0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x3, 0x1, r0, &(0x7f0000000900)="fad4979ba7374b23c7360163c961e6b81a2b6fe621c133bd4b9288d40e7b6822ee76112699439281b97786ab8899c131aec2fc4872e05e7a9bb44cab1fb1047276a19d2219d69c75fbac74ac2b8bd20f0964411d0d66879feb9a3a3ab3300fa4b7ad16b5a3ea36c8d6154a71ce", 0x6d, 0xfff, 0x0, 0x3, r0}]) 00:25:55 executing program 3: 00:25:55 executing program 0: 00:25:55 executing program 2: 00:25:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000240)=""/251) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) sendfile(r0, r0, &(0x7f0000000000)=0x4, 0x2000005) epoll_create1(0x0) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(0x0, 0x0, 0x4) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00'}) 00:25:55 executing program 2: ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0xe) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 00:25:55 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0xe) sendto$inet(r1, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r1, 0x1) 00:25:55 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000240)=""/251) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc8fb47081025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046550fa2d2d25b60361fe06f308fe6033a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334", "7b8ddcc0c891591c4116893616105829576914e70bfed06d00f97c97644ab8a7"}) sendfile(r0, r0, &(0x7f0000000000)=0x4, 0x2000005) syz_open_dev$mice(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(&(0x7f0000000480)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00'}) 00:25:55 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') getsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) preadv(r0, &(0x7f0000000700), 0x31f, 0x0) sendto$inet(r0, &(0x7f0000000080)="f6776e2a19036fd7710b089667721923c7c566d117077a3e10b59668f73c48a22ded0cd52e66e4538673ed88d8f7796563319b4d9251c661e170f510b8bf36f11640415ea1d38a407acb69acbca89a90bf41315620b45d3030c1c87a2d60d9098dd850b61b571cfe7b34fc22c74e63b345bbeb59b7d8edc013bcd82e3867dfdea46e706f6653378a65e139ed4c69d969a676c10734b50fe4f3b351c3ca430a95b6131d8b42577b693175c3c84a044289474f20a4c6fc41e8bd82d13a98af7a4d0a4450101da68aea18e155b495b032cbe1cd9facd1bd51080196db04b078f71ddb607921277945797dd7af6e37a92ce1c4", 0xf1, 0x0, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) 00:25:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0xe) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 00:25:55 executing program 0: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0xe) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x0) shutdown(r0, 0x1) 00:25:56 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{0x0}], 0x1) geteuid() getuid() 00:25:56 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='n/ro\x04\x00e\xa3H=') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) write$binfmt_elf64(r2, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x0, 0x6f, 0x0, 0xfffffffffffffffc, 0xa543ce86ec582966, 0x3f, 0x2, 0x2ee, 0x40, 0xf2, 0x5, 0x5, 0x38, 0x1, 0x3, 0x0, 0x80000000}, [{0x60000000, 0x3, 0xcbc, 0x8000, 0x401, 0xc8, 0x5, 0x2}], "57f555ce78117b03aa664019b7773a393152e285aa751aeb1cfaa18a84a6fd31e0341acfc660d6e963060c5f70814f65517e51846d27e3fa02e8f2b75c5ae337999dcc251e990facd88ff37c4ed9", [[], [], [], [], [], [], [], []]}, 0x8c6) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2280880}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x14, r3, 0x201, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xeb24d6f022131635}, 0x4844) 00:25:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000180)) 00:25:56 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) pause() open$dir(&(0x7f0000000080)='./file0\x00', 0x103001, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x0, 0x0) 00:25:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x7fff}, [{}]}, 0x78) 00:25:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:25:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) socket$packet(0x11, 0x2, 0x300) socket$inet6(0xa, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 00:25:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000280)={'bridge_slave_0\x00\x04'}) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge_slave_0\x00?', 0x2000000c0ffffff}) 00:25:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:25:57 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fchown(r0, r1, r2) renameat(r0, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') [ 3246.527327] audit_printk_skb: 2769 callbacks suppressed [ 3246.527337] audit: type=1400 audit(1546475157.303:185991): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.531882] audit: type=1400 audit(1546475157.303:185992): avc: denied { net_admin } for pid=15551 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:57 executing program 1: 00:25:57 executing program 0: [ 3246.537235] audit: type=1400 audit(1546475157.293:185990): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.546225] audit: type=1400 audit(1546475157.313:185993): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.547502] audit: type=1400 audit(1546475157.323:185994): avc: denied { net_raw } for pid=15551 comm="syz-executor1" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.554506] audit: type=1400 audit(1546475157.323:185995): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.555381] audit: type=1400 audit(1546475157.323:185996): avc: denied { net_admin } for pid=15551 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.571338] audit: type=1400 audit(1546475157.343:185997): avc: denied { net_admin } for pid=15549 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.597449] audit: type=1400 audit(1546475157.373:185998): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3246.604428] audit: type=1400 audit(1546475157.373:185999): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:25:58 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{0x0}], 0x1) geteuid() getuid() 00:25:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:25:58 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @loopback}, &(0x7f00000000c0)=0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/user\x00', 0x2, 0x0) 00:25:58 executing program 3: 00:25:58 executing program 1: 00:25:58 executing program 0: 00:25:58 executing program 3: 00:25:58 executing program 0: 00:25:58 executing program 1: 00:25:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/252}, {&(0x7f0000000100)=""/68}, {&(0x7f0000000180)=""/207}, {&(0x7f0000000280)=""/43}, {&(0x7f00000013c0)=""/4096}], 0x20000000000001b5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:25:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:25:59 executing program 3: 00:25:59 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000240)=""/148, 0x94}], 0x20000000000002b0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000100), 0x2000000000000314, 0x10400003) readv(r0, &(0x7f00000005c0)=[{0x0}], 0x1) geteuid() getuid() 00:25:59 executing program 1: 00:25:59 executing program 0: 00:25:59 executing program 3: 00:25:59 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x0) 00:25:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8042, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) pipe(&(0x7f00000000c0)) epoll_create(0x20b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 00:26:00 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xffffffffffffff34}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f00000004c0), 0x20000062, 0x6) 00:26:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='/exe\x00\x00\x00\x00\x00\x00') finit_module(r0, 0x0, 0x0) 00:26:00 executing program 2: sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000101ff9ab3094145ff00004500000000"], 0x14}}, 0x0) 00:26:00 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x821, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, 0x0, 0x0) 00:26:01 executing program 5: pipe2$9p(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x214, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:01 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)) socket$key(0xf, 0x3, 0x2) 00:26:01 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000226bd7000ffdbdf2501000000000000000b00000000140096f8041d7e81cd1b47c9dbd73d9b1462726f6164636173742d6c696e5d36e1db5ed9ed89ec07ce07858db975f2d2b81346e766e13ff208c23053ff44082b967703ec0d5f634a2407fe8ba0c8eedd9c89d31929d2f37b8796e928e3eecced86bf19dcd7e4100513a564dc51e1a87e69b3efbd36acd5cdc306de0ec02b75bb5226e44bdedd9e7196172b8d91ee322b668cd5f1f609a8627ea9853ffd678abcb1c4585b1e75eca45e7ae9"], 0x30}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x0) 00:26:01 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000080)="63ae48a778a1e05bff635df81e40d4311849dd", 0x13) 00:26:01 executing program 3: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x5207, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x4) 00:26:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 00:26:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) read(r0, 0x0, 0x0) 00:26:01 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 00:26:01 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 00:26:01 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/exec\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') exit(0xd5d) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)=0x2) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setregs(0xf, r2, 0x26d, &(0x7f0000000080)="f5894f0cbb1ecd9f58f77b0fe9ec689b23e2a0353027bc51628b9785b3aacfbf8d8daafa53158d209221bdcd88708575d0f69a23903e999ce0cc") 00:26:02 executing program 0: pipe2$9p(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0xc5b5, 0x182) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) dup2(r0, r1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) 00:26:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x7, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0000bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d40050000000000"], 0x0}, 0x48) 00:26:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 00:26:02 executing program 5: 00:26:02 executing program 1: [ 3251.537871] audit_printk_skb: 2781 callbacks suppressed [ 3251.537880] audit: type=1400 audit(1546475162.313:186927): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3251.542558] audit: type=1400 audit(1546475162.313:186928): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:02 executing program 0: [ 3251.544443] audit: type=1400 audit(1546475162.313:186929): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:02 executing program 5: [ 3251.548315] audit: type=1400 audit(1546475162.313:186931): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3251.550235] audit: type=1400 audit(1546475162.313:186932): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:02 executing program 1: [ 3251.552173] audit: type=1400 audit(1546475162.313:186933): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:02 executing program 0: [ 3251.554250] audit: type=1400 audit(1546475162.313:186934): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3251.556152] audit: type=1400 audit(1546475162.313:186935): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3251.569747] audit: type=1400 audit(1546475162.343:186936): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:03 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt_acct\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:26:03 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x100000001}}) close(r0) [ 3251.571748] audit: type=1400 audit(1546475162.343:186937): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:03 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42c00) close(r0) truncate(0x0, 0x0) 00:26:03 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000240)=0x14) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') preadv(r2, &(0x7f0000000480), 0x2000000000000113, 0x0) r3 = dup(0xffffffffffffffff) sysinfo(0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = getpid() signalfd(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x8) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0/bus\x00', 0x0) sched_setscheduler(r4, 0x1, &(0x7f0000000200)=0x3) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000400)='\x00\x10H3m\x1d\xcfw\xcf\xbai4\xf9k\x9c)\x98\xb3g?\'si6\xb0L\x18@\x94\b\xf0\xc7\x0eJ3\x14\x8fPm\xa2\xc0\xd85\x8f\xae\xa1VE\xc8\x84/{\xe2\xa7\xdfN\xb7BT\xd5(\x88\x8c\xdc\x13^we\x95\x16\x80)d\xc5\xc1n\x19\x83\xb2qx\xc5\x89\x01\xc1\x8f\xa6\xa8\x80\x1ea\xcf\x80\xec\x9f\xa7\x86Q\xa1\xdc\xb2\x11\xe3h\xd3i\xc8\xa4\xb5D\x11\xdf\xd6\x12-\xab\x80Ll\xb6Y5e^A\xa7\xb4\xd4\r\xbe8\xa9\x8bY\xf6\x89=\x7f\x97\x86b\xa0\xa4\x04\x13F\x1c{u_ T\f\x90\x8c\xf7\xa1\xa5\x89\xcf\xb2n\xc7\xf4\x80\xff\xb0\xcf\x1fh\x87\x81\x02to\xd6Wr\xbbO\x9e\xd2\xe0k\x9d\xc8\x9d/\x02_\xa1\\\xd2^\x13\xeec\x8e\v\x86\xe7\xa2eP>\xa5R6\x93a\xc9\xfb\xddc\xbaZ\x17\xaf\xfdO\x89w\x04\x94d0\xa7\x9f\xbe\xb9/\xf3\xa3\xf2L\xd8/\xa9 \xa8a\x17\xa8\b*\x17\xab\xde\x02\xe1g{\x00vh\xb2P\x8c\xb6\b\xb9\x9c*\xa7p\xe2v\\\xa6\xbc\xea\xbc\xd8$}\xd7\bC\xc7\xf0\xc8\xbc\x06\xe0\x81}\x16\xeeI&o\xc2[\b\x89G\teC\xe8\x90\x1e;<\xda\xd6\x82C\xee\xef\xc9\xf3\x03j\xcc\xa0\xd1l2\xab\xe6\xf9\x91l{\x17\bB\x8f\x1b\xda\xcd\xf7/\xdb\xde\x8dbH\xbd*\x10\xbe\xd5\xd1\x14\xecP=2\f\xd7\x18:a\x0f\t\xf4\x1a\x06\xe6o\x86\xb9\xc6\x15\xae\xe5q\xc0\x1e\x97\fot\xd4\x03\x95H\xa6\xdb\x87\n\x00\x00\x00\x00\x00\x002\xfa\xde\xa8\xf4W\xb6b\x8fr\x13\xc1\x89\xf8g)\xb6\x0f7\x969f}\xa0&h\x0e\x8d\x8c\xd3C\xcbVm\b\xa8\xa8/\xef3\xdb\x95\x12\xe1\x87\xf8\x9e\xc93\x87\x1c>%\xaaj\xb4\x8e\xb5\xbb\x06U\x18\x96r') fchdir(0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r3, 0x4c02, 0x0) 00:26:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x10, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x2c}}, 0x0) 00:26:03 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0xffffffffffffffff) 00:26:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000040)="ea08", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000e00)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 00:26:03 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)={0x71, 0x6f, 0x1, {0x8, [{0x40, 0x4, 0x5}, {0xaa, 0x3, 0x2}, {0x45, 0x2, 0x7}, {0x1, 0x2, 0x4}, {0x2, 0x0, 0x4}, {0x4, 0x3, 0x8}, {0x82, 0x0, 0x5}, {0x28, 0x3, 0x6}]}}, 0x71) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 00:26:03 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000e00)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 00:26:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffff7, 0xf8}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) sync_file_range(r1, 0x0, 0x0, 0x5) 00:26:03 executing program 1: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/context\x00', 0x2, 0x0) write$selinux_context(r0, &(0x7f0000000040)='system_u:object_r:sulogin_exec_t:s0\x00', 0x24) 00:26:03 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x2000003a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) write$UHID_CREATE2(r0, 0x0, 0xffc5) 00:26:04 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x248, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:04 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 00:26:04 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x10, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 00:26:04 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4000010) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 00:26:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xc000124) 00:26:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xac00000000000000) 00:26:04 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4000010) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 00:26:04 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001300)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000000)) 00:26:04 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffff7, 0xf8}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) sync_file_range(r1, 0x0, 0x0, 0x5) 00:26:05 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000600)=r1) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) preadv(r2, &(0x7f0000000700), 0x31f, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) r4 = getegid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1200}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xbdd0}}, {@allow_other='allow_other'}], [{@euid_lt={'euid<', r5}}, {@subj_user={'subj_user', 0x3d, ']\'^md5sum'}}]}}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x9, 0x2007fff, 0x8da3, 0x3000000000, 0x2}, 0x14) flistxattr(r2, &(0x7f0000000040)=""/133, 0x85) 00:26:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x1, 0xfffffffffffffff7, 0xf8}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) sync_file_range(r1, 0x0, 0x0, 0x5) 00:26:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x1, 0xfffffffffffffff7, 0xf8}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r0, r1) sync_file_range(r1, 0x0, 0x0, 0x5) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000300)=0x3) 00:26:05 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4000010) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 00:26:05 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:05 executing program 4: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e20, @loopback}}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000080)='\'/eth1selinuxppp1mime_type,\'\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='selfem0\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='.lo,vboxnet1*\x00', &(0x7f00000001c0)='net/route\x00'], &(0x7f0000000380)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='net/route\x00', &(0x7f0000000300)='net/route\x00', &(0x7f0000000340)='+posix_acl_access@\x00'], 0x1500) preadv(r1, &(0x7f0000000700), 0x12c, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) 00:26:05 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4000010) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) 00:26:06 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x5, {0x7, 0x1c, 0x7ff, 0x2800, 0x3, 0x1, 0xffffffffffff8000, 0x4}}, 0x50) pipe2(&(0x7f0000000000), 0x4000) ioctl$KDSETLED(r0, 0x4b32, 0x5) 00:26:06 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x4000010) 00:26:06 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:06 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) close(r0) syz_genetlink_get_family_id$ipvs(0x0) 00:26:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x1, 0xfffffffffffffff7, 0xf8}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = dup2(r0, r1) sync_file_range(r1, 0x0, 0x0, 0x5) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000300)=0x3) 00:26:06 executing program 0: 00:26:06 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x10001, 0x4) clone(0x210007d9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0xc0081, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x4, 0x32, 0xffffffffffffffff, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0x6}, 0x2a6) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/94, 0x5e}], 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x9, 0x4) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000080)=""/42) 00:26:06 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) write$binfmt_misc(r2, &(0x7f00000001c0)={'syz0', "f3e258d09a5dc45b7e2c24c65ee31690b81de87f577c6530b1d95e59cb3e0f2290816554b4fb9d68f99fb1f1c3a06549a0cb7314c51b8edb7222228018807391d915c531e7af53eaa6efb6744173dff78385d3b959f3d2e5d9f113174803c029f0"}, 0x65) 00:26:07 executing program 0: 00:26:07 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 3256.528157] keychord: invalid keycode count 0 [ 3256.554699] audit_printk_skb: 3315 callbacks suppressed [ 3256.554712] audit: type=1400 audit(1546475167.323:188042): avc: denied { sys_admin } for pid=15809 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:07 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) [ 3256.565404] audit: type=1400 audit(1546475167.333:188044): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:07 executing program 2: [ 3256.570172] audit: type=1400 audit(1546475167.333:188043): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:07 executing program 0: 00:26:07 executing program 5: mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 3256.586767] audit: type=1400 audit(1546475167.363:188045): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:07 executing program 2: 00:26:08 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) [ 3256.589492] keychord: invalid keycode count 0 [ 3256.598667] audit: type=1400 audit(1546475167.363:188046): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3256.607284] audit: type=1400 audit(1546475167.363:188047): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:08 executing program 3: 00:26:08 executing program 0: [ 3256.615001] audit: type=1400 audit(1546475167.363:188048): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3256.617665] audit: type=1400 audit(1546475167.363:188049): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3256.621575] audit: type=1400 audit(1546475167.393:188050): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3256.624125] audit: type=1400 audit(1546475167.393:188051): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 00:26:08 executing program 2: 00:26:08 executing program 5: mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:08 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:26:08 executing program 0: 00:26:08 executing program 3: 00:26:08 executing program 0: 00:26:08 executing program 5: mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:08 executing program 2: 00:26:08 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) memfd_create(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:09 executing program 3: 00:26:09 executing program 4: 00:26:09 executing program 0: 00:26:09 executing program 2: 00:26:09 executing program 5: open(0x0, 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:09 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) memfd_create(0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:09 executing program 3: 00:26:09 executing program 4: 00:26:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) 00:26:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 00:26:09 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:09 executing program 5: open(0x0, 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r1, &(0x7f0000000080)="11", 0x1, 0x0, 0x0, 0x0) 00:26:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x80001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x11, 0xa, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x328, 0x0, 0x0, 0x0, 0x0, 0x210, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:anacron_exec_t:s0\x00'}}}, {{@ip={@initdev, @remote, 0x0, 0x0, 'tunl0\x00', 'caif0\x00'}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 00:26:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x15, 0x0, 0x0) 00:26:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x80001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x11, 0xb, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x328, 0x0, 0x0, 0x0, 0x0, 0x210, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:anacron_exec_t:s0\x00'}}}, {{@ip={@initdev, @remote, 0x0, 0x0, 'tunl0\x00', 'caif0\x00'}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 00:26:10 executing program 5: open(0x0, 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:10 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x0, 0x0, 0x100000ffffffff}) 00:26:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, 0x0) 00:26:10 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200000, 0xd80200}]) 00:26:10 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000007c0)={0x4, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e22, @empty}}}, 0x108) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:10 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:10 executing program 4: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x4000010) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x7f) 00:26:11 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:11 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) syz_open_pts(r0, 0x4000) 00:26:11 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 3260.656575] ip6_tunnel: ¸ xmit: Local address not yet configured! 00:26:11 executing program 3: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1163484001"], 0x0, 0x0, 0x0}) 00:26:11 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:11 executing program 1: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:11 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) 00:26:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) 00:26:12 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3261.257071] binder: 15966:15967 got transaction to invalid handle [ 3261.263355] binder: 15966:15967 transaction failed 29201/-22, size 0-0 line 3013 00:26:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) [ 3261.344340] binder: 15966:15970 got transaction to invalid handle [ 3261.351115] binder: 15966:15970 transaction failed 29201/-22, size 0-0 line 3013 [ 3261.375775] binder: undelivered TRANSACTION_ERROR: 29201 [ 3261.385879] binder: undelivered TRANSACTION_ERROR: 29201 00:26:12 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 3261.537008] binder: 15972:15976 transaction failed 29189/-22, size 0-8 line 3013 [ 3261.569432] audit_printk_skb: 3711 callbacks suppressed 00:26:12 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) flock(r0, 0x2) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r1, 0x2000000000000003) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2d9aaf0eafb3e9db00971600000000"], 0xf}, 0x0) 00:26:12 executing program 1: pipe2$9p(0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 3261.569441] audit: type=1400 audit(1546475172.343:189289): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:12 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:26:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x400000a78, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) fcntl$getflags(r3, 0x408) close(r1) [ 3261.583824] binder: 15972:15983 transaction failed 29189/-22, size 0-8 line 3013 [ 3261.584058] binder: undelivered TRANSACTION_ERROR: 29189 [ 3261.584080] binder: undelivered TRANSACTION_ERROR: 29189 [ 3261.584759] audit: type=1400 audit(1546475172.343:189290): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:12 executing program 1: add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 3261.586833] audit: type=1400 audit(1546475172.343:189291): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:12 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000200)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x142}, 0x0) 00:26:12 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3261.588816] audit: type=1400 audit(1546475172.343:189292): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3261.590695] audit: type=1400 audit(1546475172.343:189293): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3261.592593] audit: type=1400 audit(1546475172.343:189294): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:13 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 3261.594473] audit: type=1400 audit(1546475172.343:189295): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:13 executing program 4: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3261.604757] audit: type=1400 audit(1546475172.373:189296): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3261.610437] audit: type=1400 audit(1546475172.383:189297): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3261.612368] audit: type=1400 audit(1546475172.383:189298): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3261.837783] blk_update_request: 767 callbacks suppressed [ 3261.837792] blk_update_request: I/O error, dev loop3, sector 0 [ 3261.837800] buffer_io_error: 767 callbacks suppressed 00:26:13 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 3261.837809] Buffer I/O error on dev loop3, logical block 0, lost async page write 00:26:13 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 3261.837838] blk_update_request: I/O error, dev loop3, sector 8 [ 3261.837845] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3261.837862] blk_update_request: I/O error, dev loop3, sector 16 [ 3261.837868] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3261.837886] blk_update_request: I/O error, dev loop3, sector 24 [ 3261.837895] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3261.837916] blk_update_request: I/O error, dev loop3, sector 32 [ 3261.837925] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3261.837945] blk_update_request: I/O error, dev loop3, sector 40 [ 3261.837955] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3261.837976] blk_update_request: I/O error, dev loop3, sector 48 [ 3261.837986] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3261.838004] blk_update_request: I/O error, dev loop3, sector 56 [ 3261.838013] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3261.838030] blk_update_request: I/O error, dev loop3, sector 64 [ 3261.838038] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3261.838059] blk_update_request: I/O error, dev loop3, sector 72 [ 3261.838069] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:26:14 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:14 executing program 4: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:14 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:14 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 00:26:14 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:26:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') sendfile(r0, r0, &(0x7f00000000c0)=0x42, 0xcd) 00:26:15 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:15 executing program 4: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:15 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) 00:26:15 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:15 executing program 0: 00:26:15 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', 0x0, &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:15 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:26:15 executing program 1: 00:26:16 executing program 0: 00:26:16 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', 0x0, &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:16 executing program 1: 00:26:16 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) r3 = socket(0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r4, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000600)=0xe8) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 00:26:16 executing program 4: 00:26:16 executing program 0: 00:26:16 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', 0x0, &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f00000001c0)="a711e9c222edfafa696c1af327", 0xd) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'lo\x00', 0x2000}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x20000000000000ff}) r4 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:26:17 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 00:26:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) read$FUSE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) 00:26:17 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 00:26:17 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r2, 0x400, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x240, r3, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3266.584339] audit_printk_skb: 2472 callbacks suppressed [ 3266.584348] audit: type=1400 audit(1546475177.353:190123): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0x1, 0x1}, 0x14}}, 0x0) [ 3266.585204] audit: type=1400 audit(1546475177.353:190124): avc: denied { read } for pid=16123 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3266.618247] audit: type=1400 audit(1546475177.393:190125): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:17 executing program 0: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) fcntl$addseals(r0, 0x409, 0x0) 00:26:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:17 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 3266.620504] audit: type=1400 audit(1546475177.393:190126): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3266.622573] audit: type=1400 audit(1546475177.393:190127): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3266.624699] audit: type=1400 audit(1546475177.393:190128): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:18 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x280201, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) lseek(r2, 0x0, 0x0) r3 = open$dir(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x4) [ 3266.637559] audit: type=1400 audit(1546475177.413:190129): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:18 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], 0x0}, 0x48) 00:26:18 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000340)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 3266.639411] audit: type=1400 audit(1546475177.413:190130): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3266.645339] audit: type=1400 audit(1546475177.413:190131): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3266.679197] audit: type=1400 audit(1546475177.453:190132): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3267.303156] blk_update_request: 640 callbacks suppressed [ 3267.303163] blk_update_request: I/O error, dev loop3, sector 0 [ 3267.303170] buffer_io_error: 640 callbacks suppressed [ 3267.303178] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3267.303202] blk_update_request: I/O error, dev loop3, sector 8 [ 3267.303209] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3267.303226] blk_update_request: I/O error, dev loop3, sector 16 [ 3267.303232] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3267.303249] blk_update_request: I/O error, dev loop3, sector 24 [ 3267.303255] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3267.303272] blk_update_request: I/O error, dev loop3, sector 32 [ 3267.303277] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3267.303292] blk_update_request: I/O error, dev loop3, sector 40 [ 3267.303299] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3267.303316] blk_update_request: I/O error, dev loop3, sector 48 [ 3267.303321] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3267.303336] blk_update_request: I/O error, dev loop3, sector 56 [ 3267.303341] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3267.303357] blk_update_request: I/O error, dev loop3, sector 64 [ 3267.303364] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3267.303379] blk_update_request: I/O error, dev loop3, sector 72 [ 3267.303385] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:26:20 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x1, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'team0\x00\x00\xff\xff\xff\xc0\x00', 0xc201}) 00:26:20 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2800000003000000, 0xe, 0x0, &(0x7f0000000200)="a06ad876d56a0e64d082778c3938", 0x0, 0xb4b}, 0x28) 00:26:20 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x32, 0x0, @dev, @remote}, @icmp=@timestamp_reply}}}}, 0x0) 00:26:20 executing program 5: open(&(0x7f0000000080)='./file0\x00', 0x101841, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, 0x0) 00:26:20 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') 00:26:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0000000000000000240012001400de3e000000000000736c617665000000000c0005000800050000000000"], 0x1}}, 0x0) 00:26:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000004200)='oom_score\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") readv(r0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/15, 0xf}], 0x1) 00:26:20 executing program 1: 00:26:20 executing program 4: 00:26:20 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:20 executing program 3: 00:26:20 executing program 4: 00:26:20 executing program 0: 00:26:20 executing program 5: 00:26:20 executing program 1: 00:26:21 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:21 executing program 3: 00:26:21 executing program 0: 00:26:21 executing program 5: 00:26:21 executing program 1: 00:26:21 executing program 4: 00:26:21 executing program 0: 00:26:21 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:21 executing program 5: 00:26:21 executing program 1: 00:26:21 executing program 3: 00:26:21 executing program 4: 00:26:22 executing program 1: 00:26:22 executing program 0: 00:26:22 executing program 5: 00:26:22 executing program 3: 00:26:22 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:22 executing program 4: [ 3271.587468] audit_printk_skb: 2856 callbacks suppressed [ 3271.587478] audit: type=1400 audit(1546475182.363:191088): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:22 executing program 1: 00:26:22 executing program 0: [ 3271.588832] audit: type=1400 audit(1546475182.363:191089): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:22 executing program 4: 00:26:22 executing program 5: 00:26:22 executing program 3: [ 3271.590742] audit: type=1400 audit(1546475182.363:191090): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3271.592849] audit: type=1400 audit(1546475182.363:191091): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3271.594742] audit: type=1400 audit(1546475182.363:191092): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:22 executing program 1: 00:26:22 executing program 0: [ 3271.606513] audit: type=1400 audit(1546475182.343:191077): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:22 executing program 4: 00:26:22 executing program 5: 00:26:23 executing program 3: [ 3271.608441] audit: type=1400 audit(1546475182.363:191093): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3271.610379] audit: type=1400 audit(1546475182.363:191094): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3271.612262] audit: type=1400 audit(1546475182.363:191095): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3271.614381] audit: type=1400 audit(1546475182.363:191096): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:23 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:23 executing program 0: 00:26:23 executing program 1: 00:26:23 executing program 3: 00:26:23 executing program 4: 00:26:23 executing program 5: 00:26:23 executing program 3: 00:26:23 executing program 5: 00:26:23 executing program 4: 00:26:23 executing program 0: 00:26:23 executing program 1: 00:26:24 executing program 4: 00:26:24 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:24 executing program 5: 00:26:24 executing program 1: 00:26:24 executing program 3: 00:26:24 executing program 0: 00:26:24 executing program 4: 00:26:24 executing program 5: 00:26:24 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:24 executing program 1: 00:26:24 executing program 3: 00:26:24 executing program 0: 00:26:24 executing program 4: 00:26:24 executing program 5: 00:26:24 executing program 1: 00:26:25 executing program 0: 00:26:25 executing program 3: 00:26:25 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:25 executing program 4: 00:26:25 executing program 1: 00:26:25 executing program 5: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f0000001200)='./file0\x00', 0x0) getgid() fstat(0xffffffffffffffff, 0x0) clone(0xc0000000, 0x0, 0x0, 0x0, &(0x7f0000001180)) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1b) wait4(0x0, 0x0, 0x1000002, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:26:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x9, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 00:26:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0xb4, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 00:26:25 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:25 executing program 4: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 00:26:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x235) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x8034}, 0x100) 00:26:25 executing program 5: r0 = socket(0x2, 0x4001, 0x0) connect$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82022ede7fc543762f6626b0f766f54c063fe114eb37d68f544c05e787f0285fcfca2d63afdabb3f079ad8d35e61b0c155911903afc3f6c2d8e8072bc90c96af35cc4a39e5c2b9147dcde06ce8e0b8f3284606d0146a00a0fe08fdd16901826226b12cae488ae125830a5b9072b00c174eda7be7040d43a47540670ec86653fea278bbc0588626ccc057f7c2b045ed65467c340754c875cb4a6efc68f57ad69e7eefa510312ade4cd70bb782c550593065071c55ff3e1757f82ece5248a52e36d426000000"], 0x1) 00:26:26 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x280201, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000000)={0x31b, 0x699, 0x8, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xba9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000440)={0xa, 0x20000000, 0x3000, 0x0, 0xfffffffffffffffa, 0x0, 0x100000001, 0x62, 0x0, 0x80000000}) 00:26:26 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x1d3) 00:26:26 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:26 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x9, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) sched_setattr(0x0, 0x0, 0x0) clock_getres(0x6, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 00:26:26 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) rmdir(0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 00:26:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x9, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clock_getres(0x6, &(0x7f0000000180)) open$dir(0x0, 0x0, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) [ 3275.907676] blk_update_request: 510 callbacks suppressed [ 3275.907682] blk_update_request: I/O error, dev loop3, sector 0 [ 3275.919207] buffer_io_error: 510 callbacks suppressed [ 3275.919214] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3275.932081] blk_update_request: I/O error, dev loop3, sector 8 [ 3275.938089] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3275.945722] blk_update_request: I/O error, dev loop3, sector 16 00:26:26 executing program 4: ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x9, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x4003ff) clock_getres(0x6, &(0x7f0000000180)) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) [ 3275.951811] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3275.959466] blk_update_request: I/O error, dev loop3, sector 24 [ 3275.965519] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3275.973182] blk_update_request: I/O error, dev loop3, sector 32 [ 3275.979260] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3275.986929] blk_update_request: I/O error, dev loop3, sector 40 [ 3275.986936] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3275.986951] blk_update_request: I/O error, dev loop3, sector 48 00:26:26 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) rmdir(0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 00:26:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20202000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, &(0x7f0000000040)) sendfile(r0, r2, 0x0, 0x100000001) [ 3275.986957] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3275.986971] blk_update_request: I/O error, dev loop3, sector 56 [ 3275.986977] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3275.986991] blk_update_request: I/O error, dev loop3, sector 64 [ 3275.986997] Buffer I/O error on dev loop3, logical block 8, lost async page write 00:26:27 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, &(0x7f00000000c0)) [ 3275.987011] blk_update_request: I/O error, dev loop3, sector 72 [ 3275.987016] Buffer I/O error on dev loop3, logical block 9, lost async page write [ 3276.598207] audit_printk_skb: 4119 callbacks suppressed 00:26:27 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x238, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) [ 3276.598216] audit: type=1400 audit(1546475187.373:192469): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:27 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000000)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 00:26:27 executing program 4: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r1, 0x4c01) socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000640)={0x248, 0x0, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x45}]}, @TIPC_NLA_NET={0x70, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xca5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @empty}, 0xffffffff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @loopback, 0xa1e5}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0xffffffff00000001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6acbaf14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_1\x00'}}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x4}, 0x4000010) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) [ 3276.600752] audit: type=1400 audit(1546475187.373:192470): avc: denied { dac_override } for pid=16413 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:27 executing program 1: r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x200000005, 0x400011, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f00005eaff8)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') 00:26:27 executing program 0: clock_gettime(0x5, &(0x7f0000000080)) [ 3276.602256] audit: type=1400 audit(1546475187.373:192471): avc: denied { dac_override } for pid=16414 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3276.620412] audit: type=1400 audit(1546475187.393:192472): avc: denied { dac_override } for pid=16414 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x1, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x3a, @local, 0x4e24, 0x3, 'lblcr\x00', 0x22c460610cb03dd0, 0xf4, 0x1b}, {@remote, 0x4e21, 0x3, 0x4, 0x6, 0x4}}, 0x44) [ 3276.626131] audit: type=1400 audit(1546475187.393:192473): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3276.636262] audit: type=1400 audit(1546475187.403:192474): avc: denied { dac_override } for pid=16413 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') getdents64(r0, 0x0, 0x0) 00:26:28 executing program 0: r0 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps_rollup\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x40000000009) 00:26:28 executing program 3: r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x200000005, 0x400011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f00005eaff8)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') 00:26:28 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create(0x68) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) [ 3276.642523] audit: type=1400 audit(1546475187.413:192475): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3276.644517] audit: type=1400 audit(1546475187.413:192476): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3276.683879] audit: type=1400 audit(1546475187.453:192477): avc: denied { dac_override } for pid=16413 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3276.688797] audit: type=1400 audit(1546475187.463:192478): avc: denied { dac_override } for pid=16413 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:29 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:29 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000140)="06"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1163484001"], 0x0, 0x0, 0x0}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046208, 0x0) 00:26:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) 00:26:29 executing program 3: r0 = memfd_create(&(0x7f00000019c0)='\x00\x8f\xed\xfa)\xe5\x106\xfb[\xb3)\xaf\xf8\xd0B/v\xde\x1f\xc0\xb3>.\xad\xeb\xdf\xed\f1@\x00\x00\x00\x00\x00\x96\xfe\xdf\x9f\'Mx\x9eg\xf4\xbf>\xce\xcc.\x87`\xf0\xbbA\xf0\x9ar\xaf\xbf\x85\x94\xef%U\xac\xd2?\x7f\x84k,\xc9\x04\xfdo\xe1\x91\x1c\x93\x8a\xa8g\xf3\x00^\xc7\x1e_\x96\xfb\"\xd7\x1b\x89\x19\'\x16\xf9|\x1cH\x15\x10\x81\x00\x008\v\x9f\xb8\'\x80o\xd2m\x9a\x00\x00\x00\x00\x00\x024\x18u\xaf]c\x18\x85n>w\x8f\b\xa7\f\xdf\xdd\xf5\x12\xbf`s\x89\xb8\x81\x05\xad$x4\xa6\x9f\x7f\xba\x83\xc5w\x15\xe7\xbf\xef\xf8\x8eb\xd4\xfe;\x01\x8c\x98\xf5\x87\x8b\x04\xce\xc9\xc4Y,\\\xae+\xe0i\x1e;\x85]\x16\xf6\xf2\x8b[\x86\xcc\xe9BR4\xea|\x8e\xff\x10r}\xd9\xae\b\x00\xc2\a\x9b\xe1\b\xb5k\x8d\xc9\xb2\xdf\xd1\xcc\xfc\xf5\x17_\xe3\x954\x7f\x17f\t>S\x05\xe8\xdf4\x84\xd5t\a\xaaq\xec\x98\xf0JX\xb8\xd6<', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x200000005, 0x400011, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f00005eaff8)) syz_open_procfs(0x0, &(0x7f0000000100)='net/netstat\x00') 00:26:29 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x11, @dev, 0x0, 0x0, 'none\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 3278.557754] binder: 16498:16501 ERROR: BC_REGISTER_LOOPER called without request [ 3278.604287] binder: release 16498:16501 transaction 554 out, still active [ 3278.611288] binder: release 16498:16501 transaction 551 in, still active 00:26:29 executing program 5: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0xffffff3a, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 00:26:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2b7069647320cbcc55f9284bd41af4b4acecfe36d0f4e2e0684fb22233fca4ff104e6ffa971636d7dfa11876369cb5043bfd7acf5e4249f6218e803546bf077d30a50ef789a5d61b3b99fd4cf586055e30925cd0abf68536dc6b0b2d63852c6a99f82a57d01545bae4126d4afb99b635280690e6b778161182590768bd98f933e4d9f019bcc954380d3bd31a18a80b2caadcfb1d7d97999a0d08862b4619af76a984c4c61d6e159699d3d22cb25e73a48abb755c05bdf742"], 0xb8) [ 3278.658701] binder: undelivered TRANSACTION_COMPLETE [ 3278.725042] binder_alloc: binder_alloc_mmap_handler: 16498 20001000-20004000 already mapped failed -16 [ 3278.763111] binder: BINDER_SET_CONTEXT_MGR already set [ 3278.806981] binder: 16498:16508 ioctl 40046207 0 returned -16 [ 3278.809348] binder_alloc: 16498: binder_alloc_buf, no vma [ 3278.809367] binder: 16498:16501 transaction failed 29189/-3, size 24-8 line 3136 [ 3278.809958] binder: 16498:16504 ERROR: BC_REGISTER_LOOPER called without request 00:26:29 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x9, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000080)}, 0x10) [ 3278.812911] binder_alloc: 16498: binder_alloc_buf, no vma [ 3278.812929] binder: 16498:16501 transaction failed 29189/-3, size 0-0 line 3136 [ 3278.823587] binder: release 16498:16501 transaction 551 out, still active 00:26:29 executing program 5: [ 3278.823592] binder: unexpected work type, 4, not freed [ 3278.823595] binder: undelivered TRANSACTION_COMPLETE [ 3278.823603] binder: send failed reply for transaction 554, target dead [ 3278.823611] binder: send failed reply for transaction 551, target dead 00:26:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2b7069647320cbcc55f9284bd41af4b4acecfe36d0f4e2e0684fb22233fca4ff104e6ffa971636d7dfa11876369cb5043bfd7acf5e4249f6218e803546bf077d30a50ef789a5d61b3b99fd4cf586055e30925cd0abf68536dc6b0b2d63852c6a99f82a57d01545bae4126d4afb99b635280690e6b778161182590768bd98f933e4d9f019bcc954380d3bd31a18a80b2caadcfb1d7d97999a0d08862b4619af76a984c4c61d6e159699d3d22cb25e73a48abb755c05bdf742"], 0xb8) 00:26:30 executing program 1: 00:26:30 executing program 0: [ 3279.205421] binder: undelivered TRANSACTION_ERROR: 29189 [ 3279.218384] binder: undelivered TRANSACTION_ERROR: 29189 00:26:30 executing program 4: 00:26:30 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:30 executing program 1: 00:26:30 executing program 5: 00:26:30 executing program 0: 00:26:30 executing program 3: 00:26:30 executing program 4: 00:26:30 executing program 5: 00:26:30 executing program 0: 00:26:30 executing program 1: 00:26:30 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:30 executing program 3: 00:26:31 executing program 4: 00:26:31 executing program 0: 00:26:31 executing program 5: 00:26:31 executing program 1: 00:26:31 executing program 3: 00:26:31 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:31 executing program 0: 00:26:31 executing program 4: 00:26:31 executing program 5: 00:26:31 executing program 1: 00:26:31 executing program 3: [ 3281.054499] blk_update_request: 250 callbacks suppressed [ 3281.054505] blk_update_request: I/O error, dev loop3, sector 0 [ 3281.065986] buffer_io_error: 250 callbacks suppressed [ 3281.065994] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3281.078865] blk_update_request: I/O error, dev loop3, sector 8 [ 3281.084838] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3281.092493] blk_update_request: I/O error, dev loop3, sector 16 [ 3281.098568] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3281.106199] blk_update_request: I/O error, dev loop3, sector 24 [ 3281.112331] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3281.119984] blk_update_request: I/O error, dev loop3, sector 32 [ 3281.126036] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3281.133698] blk_update_request: I/O error, dev loop3, sector 40 [ 3281.139770] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3281.147420] blk_update_request: I/O error, dev loop3, sector 48 00:26:31 executing program 0: [ 3281.153474] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3281.161123] blk_update_request: I/O error, dev loop3, sector 56 [ 3281.167201] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3281.174828] blk_update_request: I/O error, dev loop3, sector 64 [ 3281.180905] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3281.188547] blk_update_request: I/O error, dev loop3, sector 72 [ 3281.194605] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:26:32 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:26:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x40000100000003, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06w=\xea\x8f\xe2\xa4\xe3\x85!M\xeb&') sendfile(r0, r1, 0x0, 0x40000000009) 00:26:32 executing program 4: ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x9, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x4003ff) clock_getres(0x6, &(0x7f0000000180)) open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) 00:26:32 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 3281.608127] audit_printk_skb: 3402 callbacks suppressed [ 3281.608136] audit: type=1400 audit(1546475192.383:193613): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffdf4, 0x0, 0x0, 0xfffffe0f) 00:26:32 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000005c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f00000001c0)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x0, 0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) [ 3281.624255] audit: type=1400 audit(1546475192.383:193614): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:32 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') 00:26:32 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23}, 0x78) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x40, 0x4) write$P9_RCLUNK(r1, &(0x7f0000000000)={0x7}, 0x7) [ 3281.627995] audit: type=1400 audit(1546475192.383:193615): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3281.630096] audit: type=1400 audit(1546475192.383:193616): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:32 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3281.631981] audit: type=1400 audit(1546475192.383:193617): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') getdents(r1, &(0x7f00000001c0)=""/94, 0x5e) getdents64(r1, &(0x7f00000000c0)=""/39, 0x27) 00:26:33 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) [ 3281.633908] audit: type=1400 audit(1546475192.383:193618): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23}, 0x78) sendmmsg(r0, &(0x7f000000aa80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000007e00)=[{0x10, 0x1}], 0x10}}], 0x1, 0x40000) [ 3281.635790] audit: type=1400 audit(1546475192.383:193619): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3281.668211] audit: type=1400 audit(1546475192.443:193620): avc: denied { sys_admin } for pid=16581 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3281.669896] audit: type=1400 audit(1546475192.443:193621): avc: denied { sys_admin } for pid=16581 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:33 executing program 1: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06w=\xea\x8f\xe2\xa4\xe3\x85!M\xeb&') sendfile(r0, r1, 0x0, 0x40000000009) listen(0xffffffffffffffff, 0x0) 00:26:33 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:26:33 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3281.687891] audit: type=1400 audit(1546475192.463:193622): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:34 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 00:26:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3001}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x1d3) 00:26:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000d80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/147, 0x93}, {&(0x7f00000006c0)=""/93, 0x5d}], 0x3}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000980)=""/147, 0x93}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000000a40)=""/28, 0x1c}, {&(0x7f0000000a80)=""/35, 0x23}, {&(0x7f0000000ac0)=""/203, 0xcb}, {&(0x7f0000000bc0)=""/239, 0xef}], 0x6}}], 0x2, 0x0, 0x0) 00:26:34 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:34 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='nfs4\x00', 0x0, &(0x7f0000dedf2f)='v4') 00:26:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) close(r0) 00:26:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x40000001b, &(0x7f0000000080)={@dev}, 0xffb5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000140)=""/170, 0xaa}], 0x1) 00:26:35 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 00:26:35 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net\x00') request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r1) fchdir(r0) getdents64(r0, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x686, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) stat(0x0, 0x0) getuid() r2 = inotify_init() clock_nanosleep(0x4, 0x0, 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x81000100) 00:26:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 00:26:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) 00:26:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:36 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000000c0)='pipefs\x00', 0x0, 0x0) 00:26:36 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 00:26:36 executing program 4: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x252}], 0x1, 0x1) 00:26:36 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, 0xe, 0x5, 0x1000}}) 00:26:36 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') 00:26:36 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 00:26:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = dup2(r0, r1) sync_file_range(r1, 0x0, 0x2, 0x5) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000300)=0x3) 00:26:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 00:26:36 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') syz_open_procfs(0x0, 0x0) 00:26:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000002c0)={@empty, @empty}, 0xc) 00:26:36 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) [ 3286.628552] audit_printk_skb: 2783 callbacks suppressed [ 3286.628561] audit: type=1400 audit(1546475197.403:194554): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3286.633390] audit: type=1400 audit(1546475197.403:194556): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3286.635203] audit: type=1400 audit(1546475197.403:194555): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:37 executing program 4: 00:26:37 executing program 5: 00:26:37 executing program 1: 00:26:37 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 00:26:37 executing program 3: [ 3286.638516] audit: type=1400 audit(1546475197.403:194557): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:37 executing program 5: 00:26:37 executing program 1: 00:26:37 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) [ 3286.640691] audit: type=1400 audit(1546475197.403:194558): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3286.651459] audit: type=1400 audit(1546475197.403:194559): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3286.658228] audit: type=1400 audit(1546475197.403:194560): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:38 executing program 3: [ 3286.665291] audit: type=1400 audit(1546475197.433:194561): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:38 executing program 1: [ 3286.667827] audit: type=1400 audit(1546475197.443:194562): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:38 executing program 5: [ 3286.685860] audit: type=1400 audit(1546475197.453:194563): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:39 executing program 3: 00:26:39 executing program 5: 00:26:39 executing program 4: 00:26:39 executing program 1: 00:26:39 executing program 2: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:39 executing program 1: 00:26:39 executing program 5: 00:26:39 executing program 4: 00:26:39 executing program 3: [ 3288.528337] blk_update_request: 769 callbacks suppressed [ 3288.528344] blk_update_request: I/O error, dev loop3, sector 0 [ 3288.540002] buffer_io_error: 769 callbacks suppressed [ 3288.540010] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3288.553241] blk_update_request: I/O error, dev loop3, sector 8 [ 3288.559234] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3288.566898] blk_update_request: I/O error, dev loop3, sector 16 [ 3288.572961] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3288.580608] blk_update_request: I/O error, dev loop3, sector 24 [ 3288.586689] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3288.594320] blk_update_request: I/O error, dev loop3, sector 32 [ 3288.600404] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3288.608049] blk_update_request: I/O error, dev loop3, sector 40 [ 3288.614108] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3288.621760] blk_update_request: I/O error, dev loop3, sector 48 [ 3288.627832] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3288.635464] blk_update_request: I/O error, dev loop3, sector 56 [ 3288.641543] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3288.649194] blk_update_request: I/O error, dev loop3, sector 64 [ 3288.655246] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3288.662903] blk_update_request: I/O error, dev loop3, sector 72 [ 3288.668982] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:26:39 executing program 5: 00:26:39 executing program 1: 00:26:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:40 executing program 4: 00:26:40 executing program 5: 00:26:40 executing program 2: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:40 executing program 1: 00:26:40 executing program 4: 00:26:40 executing program 5: 00:26:40 executing program 3: 00:26:40 executing program 1: 00:26:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:40 executing program 4: 00:26:40 executing program 5: 00:26:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:41 executing program 1: 00:26:41 executing program 3: 00:26:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:26:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo\x00') getdents64(r1, &(0x7f00000000c0)=""/39, 0x27) 00:26:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x20, @empty, 0xff}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000880)="d6a758d87881ee4ac9938e438707c7eeba83d49e697bc5491658c26fbbf0e70b740eddcb7a981f842a682c2fe970a3b65571e0e15d31985c8113d9419816fada032277657938bc45c22430311f9fdb04327827c796e480ad63ef996ade99ea14fd2d83febfa3f216c192011a0e37e25ce0c63f34494834df78d3ad0fbdc56eee1f7d74a5328708f2010b5f2dfa11ed68153f4445f7ab1638a45a7d9bde8f7872599d6712a7671914774b578b40545c1b13188c6ed53a5901f6bd3e1f11544a205547491badb855", 0xc7}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, 0x0) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/connector\x00') mkdirat$cgroup(r2, &(0x7f0000000140)='syz0\x00', 0x1ff) r3 = memfd_create(&(0x7f0000000080)='posix_acl_accesslovmnet1wlan0/-[vboxnet0\x00', 0x0) write$P9_RFSYNC(r3, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}, 0x80000}, 0x1c) fchdir(r1) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0xc47) r5 = open(0x0, 0x0, 0x0) write$selinux_context(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) write(0xffffffffffffffff, &(0x7f0000000440)="ce06937b94e99543a340877ef36856dd3daf2bc660e99832ffd3c5ad3cf04f2a5d76caf7a89e85f0d686593976e971dccd0f79f8b7afb70b1784ae1e0d95875aadf3590fab4bdd9dea4d54d6b21f2374c9d85eb99ee36c5dc7836b3831581d6dca66b194f8b269c82a2096c418edc08e1c2dc005a9ddec11c9c13f07e4da2adacea2992388ba2f51f2eee7013185e6882004ef28aaddc4ac3624d305ae0f9efc7a9b8d0df2a2d09138ee1516873aaafcd81eb8c54a932c41b8ccd0f343b3874e0245039ebbb54b8ed76c373fbe4b932e4fcb477adf02b8638a4d", 0xda) ioctl$int_out(r1, 0x5462, &(0x7f0000000380)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) write(r4, &(0x7f0000000600)="b2cf791ae07fcba019ebbd2764b345fa475d494fbe60cf259fd297b6a2fdd1ea01970074f98d272cf8d67d88f966abb43192f5914c3a07cc27be2b22f5fffb76de823d144210", 0x46) select(0x40, &(0x7f0000000040), &(0x7f0000000400), &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffffffffffe02, 0x100, &(0x7f0000001880)={0xa, 0xfffffffffffffffe, 0xffff, @ipv4={[], [], @empty}, 0x7}, 0xffffffffffffffeb) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000980)=ANY=[@ANYBLOB="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"]) listen(r3, 0x81) fcntl$setpipe(r5, 0x407, 0x97) open(&(0x7f0000000340)='./bus\x00', 0x200, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) setsockopt$inet6_tcp_buf(r1, 0x6, 0x40000000000017, &(0x7f00000003c0)="a511d63ef4328d3e4e043d386651e7940518d24e023cb7ca79b352ec9c89ca98636cdabf44898afe5b15b35abfcbfc6f5c60b89080", 0x35) 00:26:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:41 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:26:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) close(r0) 00:26:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:42 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3291.638869] audit_printk_skb: 3309 callbacks suppressed [ 3291.638878] audit: type=1400 audit(1546475202.413:195669): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3291.645864] audit: type=1400 audit(1546475202.413:195670): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@remote, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() ptrace(0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000200)='./bus\x00', 0x3) r6 = open(0x0, 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="c204000017000007002e2f66696c65300a88ba8b838d20b4ecbddec2d4880fd2ccc9e5c9827f848fa95cf21269c4f98944d5d163c4dec824fa94c537470b0b9710fa85675d3aa3ee80200d78dcff90ed397a95db6d0000000000000000000000"], 0x60) sendfile(r6, 0xffffffffffffffff, 0x0, 0x2000000000bf99) fallocate(r5, 0x10, 0x0, 0xcd55) ptrace$pokeuser(0x6, r2, 0x0, 0x0) waitid(0x1, r1, 0x0, 0x8, &(0x7f0000000340)) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000480)={0x7, 0x6d, 0x2}, 0x7) r7 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000000400)='memory.max\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mknodat(r7, &(0x7f0000000240)='./bus\x00', 0x100, 0x7) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000180)) 00:26:42 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x1) write(r0, 0x0, 0x0) [ 3291.654280] audit: type=1400 audit(1546475202.423:195671): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3291.670867] audit: type=1400 audit(1546475202.443:195672): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:42 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:42 executing program 1: symlink(0x0, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000001000000001000000"], 0x0, 0x0, 0x0}) [ 3291.673180] audit: type=1400 audit(1546475202.443:195673): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:42 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3291.675201] audit: type=1400 audit(1546475202.443:195674): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:43 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0), 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffff1c) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000540)=@generic) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x34) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) creat(0x0, 0x0) unshare(0x2000400) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) bind$netlink(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, 0x0) mount(&(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, 0x0, &(0x7f00000003c0)) writev(0xffffffffffffffff, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f0000000203", 0x6}], 0x1) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000140)) r5 = socket$inet(0x10, 0x3, 0x4) openat$full(0xffffffffffffff9c, 0x0, 0x20000, 0x0) sendmsg(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000001b40)=[{{0x0, 0x118, &(0x7f0000000240), 0x0, 0x0, 0x26085d6cce6967cc}}], 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) [ 3291.687686] audit: type=1400 audit(1546475202.463:195675): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, 0x0) syz_open_procfs(0x0, 0x0) [ 3291.689683] audit: type=1400 audit(1546475202.463:195677): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:43 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3291.691752] audit: type=1400 audit(1546475202.463:195678): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) [ 3291.693753] audit: type=1400 audit(1546475202.463:195679): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3292.676209] binder_alloc: 16870: binder_alloc_buf, no vma [ 3292.676228] binder: 16870:16872 transaction failed 29189/-3, size 0-0 line 3136 [ 3292.750256] binder: BINDER_SET_CONTEXT_MGR already set [ 3292.750265] binder: 16870:16878 ioctl 40046207 0 returned -16 [ 3292.754578] binder: undelivered TRANSACTION_ERROR: 29189 [ 3292.907843] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3292.907852] CPU: 0 PID: 16882 Comm: syz-executor5 Not tainted 4.9.141+ #23 [ 3292.907866] ffff8800a4c5f890 ffffffff81b42e79 1ffff1001498bf14 ffff8801becc2f80 [ 3292.907877] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a4c5f9d8 [ 3292.907888] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3292.907890] Call Trace: [ 3292.907903] [] dump_stack+0xc1/0x128 [ 3292.907914] [] warn_alloc.cold.31+0x7f/0x9c [ 3292.907925] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3292.907934] [] ? check_preemption_disabled+0x3b/0x200 [ 3292.907945] [] ? avc_has_perm+0x9e/0x3a0 [ 3292.907953] [] __vmalloc_node_range+0x35e/0x600 [ 3292.907963] [] ? task_has_security+0x130/0x270 [ 3292.907970] [] vmalloc+0x5b/0x70 [ 3292.907979] [] ? sel_write_load+0x135/0xfa0 [ 3292.907988] [] sel_write_load+0x135/0xfa0 [ 3292.907996] [] ? sel_read_bool+0x240/0x240 [ 3292.908004] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.908017] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.908025] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.908033] [] __vfs_write+0x115/0x580 [ 3292.908041] [] ? sel_read_bool+0x240/0x240 [ 3292.908049] [] ? __vfs_read+0x560/0x560 [ 3292.908058] [] ? check_preemption_disabled+0x3b/0x200 [ 3292.908067] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3292.908075] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3292.908084] [] ? __sb_start_write+0x161/0x300 [ 3292.908092] [] vfs_write+0x187/0x520 [ 3292.908100] [] SyS_write+0xd9/0x1c0 [ 3292.908107] [] ? SyS_read+0x1c0/0x1c0 [ 3292.908115] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3292.908122] [] ? SyS_read+0x1c0/0x1c0 [ 3292.908130] [] do_fast_syscall_32+0x2f1/0xa10 [ 3292.908139] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3292.908149] [] entry_SYSENTER_compat+0x90/0xa2 [ 3292.908170] Mem-Info: [ 3292.908191] active_anon:597553 inactive_anon:187544 isolated_anon:0 [ 3292.908191] active_file:5240 inactive_file:45261 isolated_file:0 [ 3292.908191] unevictable:0 dirty:80 writeback:0 unstable:0 [ 3292.908191] slab_reclaimable:8114 slab_unreclaimable:78405 [ 3292.908191] mapped:107458 shmem:208152 pagetables:34813 bounce:0 [ 3292.908191] free:614364 free_pcp:372 free_cma:0 [ 3292.908207] Node 0 active_anon:2390212kB inactive_anon:750176kB active_file:20960kB inactive_file:181044kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429832kB dirty:320kB writeback:0kB shmem:832608kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3292.908228] DMA32 free:2448380kB min:4696kB low:7712kB high:10728kB active_anon:306300kB inactive_anon:92808kB active_file:228kB inactive_file:12176kB unevictable:0kB writepending:20kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3632kB slab_unreclaimable:133348kB kernel_stack:5472kB pagetables:8424kB bounce:0kB free_pcp:372kB local_pcp:188kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3292.908283] Normal free:9076kB min:5580kB low:9168kB high:12756kB active_anon:2083912kB inactive_anon:657368kB active_file:20732kB inactive_file:168868kB unevictable:0kB writepending:300kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28824kB slab_unreclaimable:180272kB kernel_stack:45728kB pagetables:130828kB bounce:0kB free_pcp:1116kB local_pcp:380kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3292.908381] DMA32: 77*4kB (ME) 149*8kB (UME) 628*16kB (UME) 80*32kB (UE) 139*64kB (UME) 140*128kB (UME) 148*256kB (UME) 40*512kB (UME) 18*1024kB (UME) 8*2048kB (UME) 565*4096kB (UM) = 2448348kB Normal: 2087*4kB (UME) 61*8kB (U) 3*16kB (UM) 7*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9108kB 258652 total pagecache pages [ 3292.908427] 0 pages in swap cache [ 3292.908435] Swap cache stats: add 0, delete 0, find 0/0 [ 3292.908438] Free swap = 0kB [ 3292.908440] Total swap = 0kB [ 3292.908443] 1965979 pages RAM [ 3292.908445] 0 pages HighMem/MovableOnly [ 3292.908447] 313617 pages reserved [ 3292.989712] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3292.989721] CPU: 0 PID: 16882 Comm: syz-executor5 Not tainted 4.9.141+ #23 [ 3292.989745] ffff8800a4c5f890 ffffffff81b42e79 1ffff1001498bf14 ffff8801becc2f80 [ 3292.989758] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a4c5f9d8 [ 3292.989781] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3292.989783] Call Trace: [ 3292.989810] [] dump_stack+0xc1/0x128 [ 3292.989821] [] warn_alloc.cold.31+0x7f/0x9c [ 3292.989833] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3292.989844] [] ? check_preemption_disabled+0x3b/0x200 [ 3292.989855] [] ? avc_has_perm+0x9e/0x3a0 [ 3292.989865] [] __vmalloc_node_range+0x35e/0x600 [ 3292.989875] [] ? task_has_security+0x130/0x270 [ 3292.989883] [] vmalloc+0x5b/0x70 [ 3292.989892] [] ? sel_write_load+0x135/0xfa0 [ 3292.989901] [] sel_write_load+0x135/0xfa0 [ 3292.989911] [] ? sel_read_bool+0x240/0x240 [ 3292.989920] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.989928] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.989937] [] ? trace_hardirqs_on+0x10/0x10 [ 3292.989945] [] __vfs_write+0x115/0x580 [ 3292.989954] [] ? sel_read_bool+0x240/0x240 [ 3292.989962] [] ? __vfs_read+0x560/0x560 [ 3292.989971] [] ? check_preemption_disabled+0x3b/0x200 [ 3292.989981] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3292.989990] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3292.989999] [] ? __sb_start_write+0x161/0x300 [ 3292.990007] [] vfs_write+0x187/0x520 [ 3292.990015] [] SyS_write+0xd9/0x1c0 [ 3292.990023] [] ? SyS_read+0x1c0/0x1c0 [ 3292.990033] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3292.990041] [] ? SyS_read+0x1c0/0x1c0 [ 3292.990049] [] do_fast_syscall_32+0x2f1/0xa10 [ 3292.990059] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3292.990070] [] entry_SYSENTER_compat+0x90/0xa2 [ 3292.990073] Mem-Info: [ 3292.990095] active_anon:598453 inactive_anon:187544 isolated_anon:0 [ 3292.990095] active_file:5240 inactive_file:45261 isolated_file:0 [ 3292.990095] unevictable:0 dirty:80 writeback:0 unstable:0 [ 3292.990095] slab_reclaimable:8114 slab_unreclaimable:78405 [ 3292.990095] mapped:107458 shmem:208152 pagetables:34850 bounce:0 [ 3292.990095] free:613362 free_pcp:342 free_cma:0 [ 3292.990112] Node 0 active_anon:2393812kB inactive_anon:750176kB active_file:20960kB inactive_file:181044kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429832kB dirty:320kB writeback:0kB shmem:832608kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3292.990133] DMA32 free:2444372kB min:4696kB low:7712kB high:10728kB active_anon:309900kB inactive_anon:92808kB active_file:228kB inactive_file:12176kB unevictable:0kB writepending:20kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3632kB slab_unreclaimable:133348kB kernel_stack:5600kB pagetables:8572kB bounce:0kB free_pcp:252kB local_pcp:196kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3292.990165] Normal free:9076kB min:5580kB low:9168kB high:12756kB active_anon:2083912kB inactive_anon:657368kB active_file:20732kB inactive_file:168868kB unevictable:0kB writepending:300kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28824kB slab_unreclaimable:180272kB kernel_stack:45728kB pagetables:130828kB bounce:0kB free_pcp:1116kB local_pcp:380kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3292.990233] DMA32: 77*4kB (UE) 132*8kB (UE) 628*16kB (UME) 73*32kB (UE) 95*64kB (UE) 134*128kB (UME) 148*256kB (UME) 40*512kB (UME) 18*1024kB (UME) 8*2048kB (UME) 565*4096kB (UM) = 2444404kB Normal: 2087*4kB (UME) 61*8kB (U) 3*16kB (UM) 7*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9108kB 258652 total pagecache pages [ 3292.990280] 0 pages in swap cache [ 3292.990285] Swap cache stats: add 0, delete 0, find 0/0 [ 3292.990287] Free swap = 0kB [ 3292.990290] Total swap = 0kB [ 3292.990293] 1965979 pages RAM [ 3292.990295] 0 pages HighMem/MovableOnly [ 3292.990298] 313617 pages reserved 00:26:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:45 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008913, &(0x7f0000000140)="0a5c2d0240316285717070") socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/enforce\x00', 0x22000, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0xe3, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000500)=')eth1-\x00', 0xfffffffffffffffc) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000240)=0x4) keyctl$chown(0x4, r6, r5, r4) fgetxattr(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="747275737465642e696d6e6574312e3a00df4c79b4c73ff177eb78b1192b6ca3a11c3ce5575229ffa6cd70dac39cf7480b3ed98513803e11c4cbfecbdfb6a1c24dcc615124a6a9cb0598519e505d"], 0x0, 0x0) stat(&(0x7f00000001c0)='./bus\x00', 0x0) setresuid(0x0, r5, 0x0) socket$inet6(0xa, 0x0, 0x7ffffffa) sched_setaffinity(0x0, 0xfffffffffffffe7c, &(0x7f00000004c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) read$eventfd(r8, &(0x7f0000000480), 0x8) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f00000003c0)='sit0\x00', 0x8) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2008002) sendfile(r8, r9, 0x0, 0x8000fffffffe) 00:26:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:45 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/status\x00', 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) fcntl$getown(r0, 0x9) 00:26:45 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 00:26:45 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 00:26:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:45 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/136, 0x88}], 0x1, 0x0) 00:26:45 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) 00:26:45 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0x1}) 00:26:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:46 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r1, r2, 0x0, 0x1) 00:26:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000580)='pids.current\x00\x99\xa3\xd4\x94\xf6c\x92!53\xdf\xaa\xfc\xff\x19\xc5t\xdfR_\xda#\x81F\xc2f`\x85\xa7\x00\x02\x97%\x0e\xb3fz.\x1f\x93\xb9\x1d\x87\xdd\xcc\x1f\xb60\xcb^\xc6\xd3\x1aD\xf8\xca\xa5\xcej*x\xc1!|\x15:\xcc\xbc+HI\x8c\xa3\xbd\x1d7C\xa3\xb9\xfc:\x88\xbdn\xd5\x00\x00\x00\x00\x00\x00\x00\x00&\xc9%\x93\x869\xfa\x9bM\xa8}0\'^m\x12\xf2\xe0 \bA\xe6\x94\x97T\x8f\xd8\xd7\xe2\x13\xda\x94\x11+\xfd\xa7GZ\x96\x19\x96\rjzz%p\n\xd1\x8aC\x7f\'\xd3\xca5\x11\xd1j\xb8\x13\x16\xc2\xa1\xd2d\xba~\xb3\b5\x8b\xa6\x1ew\xed!\x01\x03\x00\x00\x00\xa5\xf81\xcf\x05\xa2\xec\x7f\xd7=\xce\b\xae=X5b|\xa8\xec\xe3f\t\xf8HCGc`\xb9\x15\x86\x8a\xd9\x10\xb7L\x8d\xcb\xe2\x9f\"G\x9c\x96bD\xf8\xa9l\x878td\x8ee\xeb\x99!t\xbc\xd1jd2\x97C8\xf7>\xd1\xbb\x19\xe1\x92\xa3t\x93\x0ej\xd0\xa3\x8e\x99#\x01Pe\xa6 \xf8\x99\xc3\xa7\x90\x95p0\xca/\xb2\xceOae\x00\xe0\x03\x11\x9b\a\xb8\x82\xefR\xbe{\xdd\x91,,\x9e\xe5\x16`\xe0', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2009) 00:26:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) sendto$inet(r0, &(0x7f00000003c0)='5', 0x1, 0x4000000, 0x0, 0x0) close(r0) 00:26:46 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 00:26:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:46 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x0) close(r0) 00:26:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x1) 00:26:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000e80)="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", 0x209, 0x4008001, 0x0, 0x0) 00:26:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) write$uinput_user_dev(r0, 0x0, 0x3b4) 00:26:47 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x1) 00:26:47 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:47 executing program 1: seccomp(0x200000001, 0x0, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x6, 0x0, 0x0, 0x7ffff7ffc0000}]}) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) [ 3296.671795] audit_printk_skb: 2415 callbacks suppressed [ 3296.671804] audit: type=1400 audit(1546475207.443:196484): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:47 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3296.677607] audit: type=1400 audit(1546475207.453:196485): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:47 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x1) [ 3296.679230] audit: type=1400 audit(1546475207.453:196486): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3296.681235] audit: type=1400 audit(1546475207.453:196487): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 3296.688715] audit: type=1400 audit(1546475207.463:196489): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3296.691223] audit: type=1400 audit(1546475207.463:196490): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:48 executing program 3: 00:26:48 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) [ 3296.693102] audit: type=1400 audit(1546475207.463:196491): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 3296.695029] audit: type=1400 audit(1546475207.463:196492): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3296.719514] audit: type=1400 audit(1546475207.493:196493): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3296.722208] audit: type=1400 audit(1546475207.453:196488): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:48 executing program 5: 00:26:48 executing program 3: 00:26:48 executing program 1: 00:26:48 executing program 4: close(0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 00:26:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:49 executing program 3: 00:26:49 executing program 1: 00:26:49 executing program 5: 00:26:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:49 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 00:26:49 executing program 3: 00:26:49 executing program 1: 00:26:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:49 executing program 5: 00:26:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:49 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x0) 00:26:50 executing program 1: 00:26:50 executing program 3: 00:26:50 executing program 5: 00:26:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140), 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:50 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x0) 00:26:50 executing program 3: 00:26:50 executing program 1: 00:26:50 executing program 5: 00:26:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:50 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:50 executing program 4: close(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x0) 00:26:51 executing program 3: 00:26:51 executing program 1: 00:26:51 executing program 5: 00:26:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:51 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:51 executing program 3: 00:26:51 executing program 5: 00:26:51 executing program 4: 00:26:51 executing program 1: 00:26:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:26:51 executing program 3: 00:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") socketpair(0x18, 0x0, 0x0, 0x0) 00:26:51 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x100100, 0xc) 00:26:51 executing program 1: socketpair(0x22, 0x0, 0x0, 0x0) 00:26:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 00:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000880)="d6a758d87881ee4ac9938e438707c7eeba83d49e697bc5491658c26fbbf0e70b740eddcb7a981f842a682c2fe970a3b65571e0e15d31985c8113d9419816fada032277657938bc45c22430311f9fdb04327827c796e480ad63ef996ade99ea14fd2d83febfa3f216c192011a0e37e25ce0c63f34494834df78d3ad0fbdc56eee1f7d74a5328708f2010b5f2dfa11ed68153f4445f7ab1638a45a7d9bde8f7872599d6712a7671914774b578b40545c1b13188c6ed53a5901f6bd3e1f11544a205547491badb855", 0xc7}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000300)=0xfffffffffffffffe) listen(r0, 0x81) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz1\x00', 0x1ff) r2 = memfd_create(&(0x7f00000004c0)='system_u:object_r:crontab_exec_t:s0\x00', 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='\x00\x00\x00\x1a\xe3\npL\xa9\xf9\xe5\x9c\xfb0\x97%/|(\xc5\x8d t/R\v\xdbxl\xa9H\x82\x00\x00\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) fcntl$setstatus(r3, 0x4, 0xc04) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(r5, &(0x7f0000000000)='system_u:object_r:crontab_exec_t:s0\x00', 0xfffffffffffffe84) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) write(r5, &(0x7f0000000080), 0x280) ioctl$int_out(r4, 0x545c, &(0x7f00000002c0)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) write(r4, &(0x7f0000000480)="b2cf691ae07fcba019ebbd608319272fab37a71632517fc6ea632764b345fa475d494fbe60cf259fd297b6a2", 0x2c) select(0x40, &(0x7f0000000040), &(0x7f0000000400), &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffff}, 0x1c) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"]) listen(r3, 0x400000000000) renameat(r4, &(0x7f0000000340)='./bus\x00', r4, &(0x7f0000000380)='./bus\x00') open(&(0x7f0000000640)='./bus\x00', 0x2000000001ff, 0x190) r6 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(r6, 0x6, 0x4000000000001a, &(0x7f00000003c0)="a511d63ef4328d3e4e043d386651e7940518d24e023cb7ca79b352ec9c89ca98636cdabf44898afe5b15b35abfcbfc6f5c60b89080", 0x35) 00:26:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @rand_addr=0x1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x404c8d1) shutdown(r0, 0x1) recvmmsg(r0, &(0x7f0000008c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 00:26:52 executing program 5: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffffffffffffa}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000880)="d6a758d87881ee4ac9938e438707c7eeba83d49e697bc5491658c26fbbf0e70b740eddcb7a981f842a682c2fe970a3b65571e0e15d31985c8113d9419816fada032277657938bc45c22430311f9fdb04327827c796e480ad63ef996ade99ea14fd2d83febfa3f216c192011a0e37e25ce0c63f34494834df78d3ad0fbdc56eee1f7d74a5328708f2010b5f2dfa11ed68153f4445f7ab1638a45a7d9bde8f7872599d6712a7671914774b578b40545c1b13188c6ed53a5901f6bd3e1f11544a205547491badb855", 0xc7}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000500)=0xfffffffffffffffa) listen(r0, 0x7f) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='\xef^\x0e\xc6\x00', 0x1ff) r2 = memfd_create(&(0x7f00000004c0)='system_u:object_r:crontab_exec_t:s0\x00', 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x7, 0x33, 0x1}, 0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='\x00\x00\x00\x1a\xe3\npL\xa9\xf9\xe5\x9c\xfb0\x97%/|(\xc5\x8d t/R\v\xdbxl\xa9H\x82\x00\x00\x00', 0x200002, 0x0) r4 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0xc04) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x141042, 0xfffffffbfffffffc) write$selinux_context(r5, &(0x7f0000000000)='system_u:object_r:crontab_exec_t:s0\x00', 0xfffffffffffffe84) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000580)='htcp\x00', 0x5) write(r5, &(0x7f0000000180), 0x18f) ioctl$int_out(r1, 0xfd, &(0x7f0000000080)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) write(r4, &(0x7f0000000480)="b2cf691ae07fcba019ebbd608319272fab37a71632517fc6ea632764b345fa475d494fbe60cf259fd297b6a2", 0x2c) select(0x40, &(0x7f0000000040), &(0x7f0000000400)={0x0, 0xfffffffffffffffa}, &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) io_setup(0x200000004, &(0x7f0000000380)) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0x0, 0xffff}, 0xfffffffffffffe3a) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000d80)=ANY=[@ANYBLOB="0000bf750800000000152a6991be481d0bfd080000dcbc4649cdac1a37be54833f7651820ebccf4013e4ab69ef1cea4c14084d706e5000000000005bfdb01096418539b29dda8fb46f37647966d07e4e97421412de230766e7176d8f420f560c04b7f66c09370ca06cfbf6bcf502894800c62a7836b4fe00000000000089b563196ec066ca9c571701187c6e715685f07082c8a6bb04ed501f1540583fa1677ba7020e0dfa12629783d7b605000000b994920486132fe79803e0196135dd2d40c76c4a4ce60fa9a065bce9a443e842199832020638e77115797761b93ec249c87b3b2f474071ab54ccd700aedcfd7a63e542046ff1217a9d859c90e5b85705000000000000000b3eaa702bcfa714190300acd3f4d93a1de5576bc53e92984cc18521f4ec8a701a156380e5e3d1260102b06d0f00da67e039b23995c603000000aefab42a0b1b8aacdf26d00437d91f4d6491fc0971bc000000000000009c7a00000000000000e9141d069b4d7b591e95829b01000000000000001ff3ca5d60c98bcca778156f3a57bb651ab98521dbfa383ae0936383902287b0350af4f2ba3cbbfd2e4f584ed522a656e7e2258f5d6808910a4106a27e6d2b1e2d39259a612f2f0cff84cf603763b9dfa65760e97227e26b9c30ed83fbab37184cfe63d2fa509526ee82be854c896fdd52208acbc220de8576b54594d5243fcb4000c60c502312fffc7ac32c00002c5b2be871e63e2ead2c47cd33b2be96824dfa2fd900000000000000007424f4faf821bb61e29b9f7efe79ffd9e26302dddafa7352c6c9ffcafffdb3dacef88128cbb20938f09e18c5952fd162b793413458b44c6f71f1a4df544bf10fac82e94d59ae50e1348d9b3efef4feb087c3df7e717f437860bddb30866666cb376e54059d7694fbe709b674740ab16c5788d8cbf1d696dd76c8edf6013d7e3524f705e25833d243e74bd9d4d6f08b5afdedc0506377dd361f0000000000000000005ecc166916af9c46d81cce01b3569303e387f564246de703b2a7f7feacae069f0cf854c067a0d0e8a4e0602c9b4ee119561b1a921a1cfa924819a618315bae7ff9c9ba2688ef9692472eb643bd0229d648ff35857877e9bdbca1e828636cc250dcbe73244bd1e2d68d8f43d8945e4c86c253a6e7070917e7e3e5afd873210aca0e02d57005c272a34ea518e764ff4aece6cb1a3b363e3a582f47f90dac3d4e1cadf451656ed52187c8e5d48c271caeb4da907a80c4e9d89fc56cef6fa1a972a4bf7efb391b1a422378c8eff08e277463cd0336ef2129d680896403326c2f90a3812535c266d3cd0d848f97373f8760d6de0ccda11eb110c6e20e6dddac14ae023c92871c2c89e1ec6e0f0a902ceb"]) open(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x2, 0x4, 0x5}) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 3301.682265] audit_printk_skb: 3791 callbacks suppressed [ 3301.682274] audit: type=1400 audit(1546475212.453:197760): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:52 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) fallocate(r0, 0x0, 0x0, 0x0) lseek(r2, 0x0, 0x3) open$dir(0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x0, 0x699, 0x8, 0x4}) 00:26:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 00:26:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3301.687628] audit: type=1400 audit(1546475212.463:197761): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3301.700007] audit: type=1400 audit(1546475212.473:197762): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3301.702053] audit: type=1400 audit(1546475212.473:197763): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:53 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) [ 3301.709770] audit: type=1400 audit(1546475212.483:197764): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) [ 3301.720802] audit: type=1400 audit(1546475212.493:197765): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3301.734232] audit: type=1400 audit(1546475212.503:197766): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3301.734699] audit: type=1400 audit(1546475212.503:197767): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:53 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 00:26:53 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x60}}) [ 3301.765389] audit: type=1400 audit(1546475212.533:197768): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3301.809823] audit: type=1400 audit(1546475212.583:197769): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:54 executing program 5: openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='sched\x00') write$UHID_CREATE2(r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 00:26:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x2000000000002, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) 00:26:54 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) lseek(r2, 0x0, 0x3) open$dir(0x0, 0x0, 0x0) 00:26:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x8}) 00:26:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, 0x0) 00:26:54 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000340)="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", 0x1f3, 0x40800, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x576, 0x0, 0x0, 0x0) 00:26:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)='c', 0x1, 0x4000000, 0x0, 0x0) 00:26:54 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0)={0x0, r1/1000+30000}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x93) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240)={0x0, 0x0, 0x5}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x80, 0x4) sendto$inet(r0, &(0x7f0000000100), 0xfffffffffffffdf4, 0x0, 0x0, 0xfffffe0f) socket$inet_udplite(0x2, 0x2, 0x88) 00:26:54 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) 00:26:54 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:55 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'security\x00'}, 0x0) 00:26:55 executing program 0: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 00:26:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0010000200aa08020000000000000000000001050006f4200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000000000000000"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000014e, 0x0) 00:26:55 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:55 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:26:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4000) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:26:55 executing program 0: 00:26:56 executing program 3: 00:26:56 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:56 executing program 5: 00:26:56 executing program 0: 00:26:56 executing program 1: 00:26:56 executing program 3: 00:26:56 executing program 5: 00:26:57 executing program 4: 00:26:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:57 executing program 0: 00:26:57 executing program 1: [ 3306.725787] audit_printk_skb: 2481 callbacks suppressed [ 3306.725796] audit: type=1400 audit(1546475217.493:198600): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:57 executing program 5: 00:26:57 executing program 1: 00:26:57 executing program 3: [ 3306.741813] audit: type=1400 audit(1546475217.513:198601): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:57 executing program 0: [ 3306.745065] audit: type=1400 audit(1546475217.513:198602): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:57 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3306.747442] audit: type=1400 audit(1546475217.523:198603): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:58 executing program 3: 00:26:58 executing program 5: [ 3306.751360] audit: type=1400 audit(1546475217.523:198604): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:58 executing program 1: [ 3306.753490] audit: type=1400 audit(1546475217.523:198605): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3306.755689] audit: type=1400 audit(1546475217.523:198606): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3306.758733] audit: type=1400 audit(1546475217.533:198607): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3306.761670] audit: type=1400 audit(1546475217.533:198608): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3306.763693] audit: type=1400 audit(1546475217.533:198609): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:26:58 executing program 4: 00:26:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:58 executing program 0: 00:26:58 executing program 5: 00:26:58 executing program 1: 00:26:58 executing program 3: 00:26:58 executing program 0: 00:26:58 executing program 3: 00:26:58 executing program 5: 00:26:58 executing program 1: 00:26:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:59 executing program 4: 00:26:59 executing program 5: 00:26:59 executing program 1: 00:26:59 executing program 0: 00:26:59 executing program 3: 00:26:59 executing program 4: 00:26:59 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:26:59 executing program 5: 00:26:59 executing program 1: 00:26:59 executing program 0: 00:26:59 executing program 3: 00:27:00 executing program 4: 00:27:00 executing program 5: 00:27:00 executing program 1: 00:27:00 executing program 0: [ 3309.450136] blk_update_request: 640 callbacks suppressed [ 3309.450143] blk_update_request: I/O error, dev loop3, sector 0 [ 3309.461693] buffer_io_error: 640 callbacks suppressed [ 3309.461701] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3309.474568] blk_update_request: I/O error, dev loop3, sector 8 [ 3309.480590] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3309.488255] blk_update_request: I/O error, dev loop3, sector 16 [ 3309.494315] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3309.501984] blk_update_request: I/O error, dev loop3, sector 24 [ 3309.508255] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3309.515893] blk_update_request: I/O error, dev loop3, sector 32 [ 3309.521986] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3309.529668] blk_update_request: I/O error, dev loop3, sector 40 [ 3309.535727] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3309.543378] blk_update_request: I/O error, dev loop3, sector 48 00:27:00 executing program 3: [ 3309.549458] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3309.557120] blk_update_request: I/O error, dev loop3, sector 56 [ 3309.563190] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3309.570854] blk_update_request: I/O error, dev loop3, sector 64 [ 3309.576933] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3309.584572] blk_update_request: I/O error, dev loop3, sector 72 [ 3309.590670] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:27:00 executing program 5: 00:27:00 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) lseek(r2, 0x0, 0x3) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 00:27:00 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:00 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, 0x0) 00:27:01 executing program 0: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='sessionid\x00') read(r0, 0x0, 0x0) 00:27:01 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='sched\x00') pread64(r0, &(0x7f0000000200)=""/168, 0xa8, 0x52) 00:27:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/39, 0xd6, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="030000400000000008001b00000000008a939294eb6d7ff9741b8352ef90001306bd8ae76a70d2bec7e907f243460b5b89e5863f0a83d4e7a65001d03197a406"], 0x1}}, 0x0) 00:27:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000080)='5'}) 00:27:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 00:27:01 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:01 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) lseek(r2, 0x0, 0x3) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lseek(r3, 0x0, 0x4) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x31b, 0x699, 0x8, 0x4}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='./file0\x00') 00:27:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:27:01 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 00:27:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 00:27:02 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3311.676613] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3311.683238] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3311.690140] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3311.697034] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3311.703880] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3311.710758] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3311.735914] audit_printk_skb: 3651 callbacks suppressed [ 3311.735923] audit: type=1400 audit(1546475222.503:199827): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:02 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') preadv(r0, &(0x7f0000000140), 0x391, 0x0) [ 3311.748152] audit: type=1400 audit(1546475222.523:199829): avc: denied { dac_override } for pid=17430 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:02 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 00:27:02 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2000203a, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) close(r0) [ 3311.749958] audit: type=1400 audit(1546475222.513:199828): avc: denied { dac_override } for pid=17427 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:02 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x6000, 0x0) [ 3311.779079] audit: type=1400 audit(1546475222.553:199830): avc: denied { dac_override } for pid=17427 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3311.841498] audit: type=1400 audit(1546475222.613:199831): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:27:03 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) [ 3311.848547] audit: type=1400 audit(1546475222.623:199832): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:03 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42c00) 00:27:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x5, 0x80000001}, 0x14) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) shutdown(r0, 0x1) [ 3311.855720] audit: type=1400 audit(1546475222.623:199833): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3311.898548] audit: type=1400 audit(1546475222.673:199834): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933c", 0xc5, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x3a8, 0x0, 0x0, 0x0) [ 3311.907108] audit: type=1400 audit(1546475222.673:199835): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:03 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000180)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$poke(0x4209, r0, &(0x7f00000000c0), 0x0) 00:27:03 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) recvmmsg(r0, &(0x7f0000003a00)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000340)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933c", 0xc5, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000e80)="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", 0x410, 0x0, 0x0, 0x0) [ 3311.908295] audit: type=1400 audit(1546475222.683:199836): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3311.916445] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3312.076509] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3312.076665] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3312.076751] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3312.076823] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3312.076898] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3312.076972] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3312.376438] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3312.596447] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3312.715219] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3312.936514] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3312.936672] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3312.936749] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3312.936828] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3312.936896] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3312.936964] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 00:27:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x25, 0x1, 0x188, [0x20000500, 0x0, 0x20000530, 0x0, 0x0, 0x20000658], 0x0, 0x0, &(0x7f0000000500)=[{}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x0, 0x0, 'vcan0\x00', 'ip_vti0\x00', 'lo\x00', 'syz_tun\x00', @link_local, [], @empty, [], 0x70, 0xa8, 0xf8}, [@common=@mark={'mark\x00', 0x10}]}, @common=@log={'log\x00', 0x28, {{0x0, "3643398478e3faccb16212322238e5f17050f5379caf7076f10f0e3ba626"}}}}]}, {0x0, '\x00', 0x1}]}, 0x1c4) 00:27:04 executing program 5: mknodat(0xffffffffffffffff, 0x0, 0xe034, 0x0) [ 3313.456412] ip6_tunnel: ¸ xmit: Local address not yet configured! 00:27:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 00:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc) [ 3313.506425] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3313.513341] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3313.566449] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! 00:27:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) truncate(0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r1, &(0x7f00000001c0)={0x7}, 0x102fe) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0x7}, 0xff7f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x5, 0x2, 0x3}) 00:27:04 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 00:27:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc) [ 3313.856431] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3313.926513] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3313.933060] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3313.939947] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3313.946823] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3313.953722] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3313.960601] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3314.106440] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! 00:27:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:05 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) [ 3314.216415] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3314.236400] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! 00:27:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x80000ffffffffe) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 00:27:05 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 00:27:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x2000560e, 0x0, 0x0) shutdown(r1, 0x1) 00:27:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x22, &(0x7f00000002c0)={@empty, @empty}, 0xc) [ 3314.690211] blk_update_request: 381 callbacks suppressed [ 3314.690218] blk_update_request: I/O error, dev loop3, sector 0 [ 3314.701873] buffer_io_error: 380 callbacks suppressed [ 3314.701881] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3314.714746] blk_update_request: I/O error, dev loop3, sector 4 [ 3314.720744] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3314.728407] blk_update_request: I/O error, dev loop3, sector 8 [ 3314.734376] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3314.742092] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 3314.742156] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3314.755704] blk_update_request: I/O error, dev loop3, sector 12 [ 3314.761806] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3314.769467] blk_update_request: I/O error, dev loop3, sector 16 [ 3314.775519] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3314.783169] blk_update_request: I/O error, dev loop3, sector 20 [ 3314.789261] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3314.796913] blk_update_request: I/O error, dev loop3, sector 24 [ 3314.802975] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3314.810641] blk_update_request: I/O error, dev loop3, sector 28 [ 3314.816750] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3314.824401] blk_update_request: I/O error, dev loop3, sector 32 [ 3314.830491] Buffer I/O error on dev loop3, logical block 8, lost async page write 00:27:05 executing program 5: syz_emit_ethernet(0x3e, &(0x7f000084beed)={@link_local, @local={[], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}}}}}}, 0x0) [ 3314.838148] blk_update_request: I/O error, dev loop3, sector 36 [ 3314.844211] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:27:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4000000000000002, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x2) [ 3314.976442] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3315.076499] ip6_tunnel: ¸ xmit: Local address not yet configured! [ 3315.083029] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! [ 3315.089885] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3315.096757] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! [ 3315.103596] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3315.110460] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 00:27:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, {}, {}, {}, 0x80}) 00:27:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f000000000000032000000000000200010000000000000000020000000005000500000000000a00000000000000ff1700000000000000000000000000170000000000000000"], 0x80}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 00:27:06 executing program 0: [ 3315.346431] ip6_tunnel: ip6tnl5 xmit: Local address not yet configured! 00:27:06 executing program 4: 00:27:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:06 executing program 1: [ 3315.606473] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 3315.616428] ip6_tunnel: ip6tnl4 xmit: Local address not yet configured! [ 3315.776427] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 00:27:06 executing program 3: 00:27:06 executing program 0: 00:27:06 executing program 4: [ 3315.936415] ip6_tunnel: ¸ xmit: Local address not yet configured! 00:27:06 executing program 5: 00:27:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3316.096431] ip6_tunnel: ip6tnl3 xmit: Local address not yet configured! 00:27:06 executing program 1: 00:27:07 executing program 0: 00:27:07 executing program 4: 00:27:07 executing program 3: 00:27:07 executing program 1: 00:27:07 executing program 5: 00:27:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:07 executing program 4: 00:27:07 executing program 0: [ 3316.740330] audit_printk_skb: 3105 callbacks suppressed 00:27:07 executing program 3: [ 3316.740339] audit: type=1400 audit(1546475227.513:200873): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:07 executing program 1: [ 3316.743533] audit: type=1400 audit(1546475227.513:200874): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:07 executing program 5: [ 3316.745184] audit: type=1400 audit(1546475227.513:200875): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:07 executing program 4: 00:27:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:07 executing program 3: [ 3316.747835] audit: type=1400 audit(1546475227.483:200868): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:08 executing program 1: 00:27:08 executing program 5: [ 3316.752703] audit: type=1400 audit(1546475227.523:200876): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:08 executing program 4: [ 3316.758555] audit: type=1400 audit(1546475227.533:200877): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:08 executing program 1: 00:27:08 executing program 3: [ 3316.760562] audit: type=1400 audit(1546475227.533:200878): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3316.762788] audit: type=1400 audit(1546475227.533:200879): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3316.764793] audit: type=1400 audit(1546475227.533:200880): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3316.768207] audit: type=1400 audit(1546475227.543:200881): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:08 executing program 0: 00:27:08 executing program 5: 00:27:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:08 executing program 4: 00:27:08 executing program 1: 00:27:08 executing program 3: 00:27:08 executing program 4: 00:27:08 executing program 5: 00:27:08 executing program 1: 00:27:08 executing program 3: 00:27:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:09 executing program 0: 00:27:09 executing program 4: 00:27:09 executing program 1: 00:27:09 executing program 5: 00:27:09 executing program 3: 00:27:09 executing program 0: 00:27:09 executing program 4: 00:27:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:09 executing program 1: 00:27:09 executing program 5: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x10fffc) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) 00:27:09 executing program 4: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 00:27:09 executing program 0: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, 0x0, &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:10 executing program 1: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ip6tnl0\x00'}) 00:27:10 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 00:27:10 executing program 5: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3319.967774] blk_update_request: 379 callbacks suppressed [ 3319.967782] blk_update_request: I/O error, dev loop3, sector 512 00:27:10 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0xeb5) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 00:27:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) [ 3320.332768] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3320.408243] CPU: 1 PID: 17680 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3320.415294] ffff8800af207890 ffffffff81b42e79 1ffff10015e40f14 ffff8800003497c0 [ 3320.423354] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800af2079d8 [ 3320.431613] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3320.439676] Call Trace: [ 3320.442264] [] dump_stack+0xc1/0x128 [ 3320.447622] [] warn_alloc.cold.31+0x7f/0x9c [ 3320.453613] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3320.460457] [] ? rcu_read_unlock_special+0x6d0/0xb20 [ 3320.467208] [] ? avc_has_perm+0x9e/0x3a0 [ 3320.472914] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 3320.479839] [] __vmalloc_node_range+0x35e/0x600 [ 3320.486154] [] ? task_has_security+0x130/0x270 [ 3320.492398] [] vmalloc+0x5b/0x70 [ 3320.497416] [] ? sel_write_load+0x135/0xfa0 [ 3320.503381] [] sel_write_load+0x135/0xfa0 [ 3320.509182] [] ? sel_read_bool+0x240/0x240 [ 3320.515064] [] ? trace_hardirqs_on+0x10/0x10 [ 3320.521118] [] ? trace_hardirqs_on+0x10/0x10 [ 3320.527186] [] ? trace_hardirqs_on+0x10/0x10 [ 3320.533241] [] __vfs_write+0x115/0x580 [ 3320.538776] [] ? sel_read_bool+0x240/0x240 [ 3320.544661] [] ? __vfs_read+0x560/0x560 [ 3320.550295] [] ? check_preemption_disabled+0x3b/0x200 [ 3320.557131] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3320.563967] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3320.570541] [] ? __sb_start_write+0x161/0x300 [ 3320.576690] [] vfs_write+0x187/0x520 [ 3320.582063] [] SyS_write+0xd9/0x1c0 [ 3320.587335] [] ? SyS_read+0x1c0/0x1c0 [ 3320.592782] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3320.599010] [] ? SyS_read+0x1c0/0x1c0 00:27:11 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3320.604460] [] do_fast_syscall_32+0x2f1/0xa10 [ 3320.610604] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3320.617268] [] entry_SYSENTER_compat+0x90/0xa2 00:27:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) 00:27:11 executing program 5: 00:27:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, 0x0) 00:27:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3321.429640] blk_update_request: I/O error, dev loop3, sector 0 [ 3321.435720] buffer_io_error: 379 callbacks suppressed [ 3321.435728] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3321.448614] blk_update_request: I/O error, dev loop3, sector 8 [ 3321.454603] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3321.462302] blk_update_request: I/O error, dev loop3, sector 16 [ 3321.468391] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3321.476034] blk_update_request: I/O error, dev loop3, sector 24 [ 3321.482133] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3321.489808] blk_update_request: I/O error, dev loop3, sector 32 [ 3321.495868] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3321.503551] blk_update_request: I/O error, dev loop3, sector 40 [ 3321.509815] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3321.517488] blk_update_request: I/O error, dev loop3, sector 48 00:27:12 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000140)={0x4, {{0x2, 0x4e22, @loopback}}}, 0x88) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00004aaffc)=0x2, 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x3afd, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000), &(0x7f0000000040)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) prctl$PR_SET_NAME(0xf, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0)=']', 0x1, 0x8000, 0x0, 0x0) close(r1) [ 3321.523568] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3321.531237] blk_update_request: I/O error, dev loop3, sector 56 [ 3321.537312] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3321.544955] blk_update_request: I/O error, dev loop3, sector 64 [ 3321.551042] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3321.558753] Buffer I/O error on dev loop3, logical block 9, lost async page write [ 3321.749048] audit_printk_skb: 3530 callbacks suppressed [ 3321.749057] audit: type=1400 audit(1546475232.523:202060): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.795463] audit: type=1400 audit(1546475232.563:202061): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:12 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 00:27:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f00000000c0)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) 00:27:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 00:27:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3321.797464] audit: type=1400 audit(1546475232.573:202062): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.803916] audit: type=1400 audit(1546475232.573:202063): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:12 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:12 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3321.804237] audit: type=1400 audit(1546475232.573:202064): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.817392] audit: type=1400 audit(1546475232.593:202065): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:13 executing program 4: clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 3321.829270] audit: type=1400 audit(1546475232.603:202066): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.833100] audit: type=1400 audit(1546475232.603:202067): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3321.846805] audit: type=1400 audit(1546475232.623:202068): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.860799] audit: type=1400 audit(1546475232.623:202069): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3321.948229] Mem-Info: [ 3321.948253] active_anon:596231 inactive_anon:187672 isolated_anon:0 [ 3321.948253] active_file:5240 inactive_file:45430 isolated_file:0 [ 3321.948253] unevictable:0 dirty:244 writeback:0 unstable:0 [ 3321.948253] slab_reclaimable:8088 slab_unreclaimable:78775 [ 3321.948253] mapped:107489 shmem:208284 pagetables:34783 bounce:0 [ 3321.948253] free:615342 free_pcp:428 free_cma:0 [ 3321.948271] Node 0 active_anon:2384924kB inactive_anon:750688kB active_file:20960kB inactive_file:181720kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429956kB dirty:976kB writeback:0kB shmem:833136kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3321.948295] DMA32 free:2452076kB min:4696kB low:7712kB high:10728kB active_anon:300776kB inactive_anon:93320kB active_file:228kB inactive_file:12832kB unevictable:0kB writepending:596kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3544kB slab_unreclaimable:134996kB kernel_stack:5312kB pagetables:8420kB bounce:0kB free_pcp:952kB local_pcp:444kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3321.948328] Normal free:9292kB min:5580kB low:9168kB high:12756kB active_anon:2084148kB inactive_anon:657368kB active_file:20732kB inactive_file:168888kB unevictable:0kB writepending:380kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28808kB slab_unreclaimable:180104kB kernel_stack:45792kB pagetables:130712kB bounce:0kB free_pcp:760kB local_pcp:120kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3321.949555] DMA32: 79*4kB (UE) 122*8kB (UME) 654*16kB (UME) 172*32kB (UME) 185*64kB (UME) 145*128kB (UME) 148*256kB (UME) 42*512kB (UME) 22*1024kB (UME) 10*2048kB (UME) 562*4096kB (UM) = 2452012kB Normal: 2161*4kB (UME) 81*8kB (UM) 3*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9340kB 258953 total pagecache pages [ 3321.949604] 0 pages in swap cache [ 3321.949609] Swap cache stats: add 0, delete 0, find 0/0 [ 3321.949612] Free swap = 0kB [ 3321.949615] Total swap = 0kB [ 3321.949617] 1965979 pages RAM [ 3321.949620] 0 pages HighMem/MovableOnly [ 3321.949622] 313617 pages reserved [ 3321.950380] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3321.950390] CPU: 1 PID: 17703 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3321.950407] ffff8800a1f8f890 ffffffff81b42e79 1ffff100143f1f14 ffff8801c64b0000 [ 3321.950420] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a1f8f9d8 [ 3321.950434] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3321.950436] Call Trace: [ 3321.950452] [] dump_stack+0xc1/0x128 [ 3321.950464] [] warn_alloc.cold.31+0x7f/0x9c [ 3321.950474] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3321.950484] [] ? check_preemption_disabled+0x3b/0x200 [ 3321.950494] [] ? avc_has_perm+0x9e/0x3a0 [ 3321.950503] [] __vmalloc_node_range+0x35e/0x600 [ 3321.950512] [] ? task_has_security+0x130/0x270 [ 3321.950520] [] vmalloc+0x5b/0x70 [ 3321.950528] [] ? sel_write_load+0x135/0xfa0 [ 3321.950537] [] sel_write_load+0x135/0xfa0 [ 3321.950546] [] ? check_preemption_disabled+0x3b/0x200 [ 3321.950565] [] ? check_preemption_disabled+0x3b/0x200 [ 3321.950577] [] ? sel_read_bool+0x240/0x240 [ 3321.950587] [] ? _raw_spin_unlock_irq+0x27/0x50 [ 3321.950598] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 3321.950609] [] ? trace_hardirqs_on+0x10/0x10 [ 3321.950617] [] __vfs_write+0x115/0x580 [ 3321.950627] [] ? sel_read_bool+0x240/0x240 [ 3321.950635] [] ? __vfs_read+0x560/0x560 [ 3321.950644] [] ? check_preemption_disabled+0x3b/0x200 [ 3321.950666] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3321.950677] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3321.950689] [] ? __sb_start_write+0x161/0x300 [ 3321.950699] [] vfs_write+0x187/0x520 [ 3321.950708] [] SyS_write+0xd9/0x1c0 [ 3321.950719] [] ? SyS_read+0x1c0/0x1c0 [ 3321.950731] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3321.950742] [] ? SyS_read+0x1c0/0x1c0 [ 3321.950753] [] do_fast_syscall_32+0x2f1/0xa10 [ 3321.950767] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3321.950779] [] entry_SYSENTER_compat+0x90/0xa2 [ 3321.950808] Mem-Info: [ 3321.950830] active_anon:596231 inactive_anon:187672 isolated_anon:0 [ 3321.950830] active_file:5240 inactive_file:45430 isolated_file:0 [ 3321.950830] unevictable:0 dirty:244 writeback:0 unstable:0 [ 3321.950830] slab_reclaimable:8088 slab_unreclaimable:78775 [ 3321.950830] mapped:107489 shmem:208284 pagetables:34783 bounce:0 [ 3321.950830] free:615342 free_pcp:419 free_cma:0 [ 3321.950850] Node 0 active_anon:2384924kB inactive_anon:750688kB active_file:20960kB inactive_file:181720kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429956kB dirty:976kB writeback:0kB shmem:833136kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3321.950876] DMA32 free:2452076kB min:4696kB low:7712kB high:10728kB active_anon:300776kB inactive_anon:93320kB active_file:228kB inactive_file:12832kB unevictable:0kB writepending:596kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3544kB slab_unreclaimable:134996kB kernel_stack:5312kB pagetables:8420kB bounce:0kB free_pcp:952kB local_pcp:444kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3321.950913] Normal free:9292kB min:5580kB low:9168kB high:12756kB active_anon:2084148kB inactive_anon:657368kB active_file:20732kB inactive_file:168888kB unevictable:0kB writepending:380kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28808kB slab_unreclaimable:180104kB kernel_stack:45792kB pagetables:130712kB bounce:0kB free_pcp:724kB local_pcp:120kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3321.950980] DMA32: 79*4kB (UE) 122*8kB (UME) 654*16kB (UME) 172*32kB (UME) 185*64kB (UME) 145*128kB (UME) 148*256kB (UME) 42*512kB (UME) 22*1024kB (UME) 10*2048kB (UME) 562*4096kB (UM) = 2452012kB Normal: 2161*4kB (UME) 81*8kB (UM) 3*16kB (UM) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9340kB 258953 total pagecache pages [ 3321.951026] 0 pages in swap cache [ 3321.951030] Swap cache stats: add 0, delete 0, find 0/0 [ 3321.951033] Free swap = 0kB [ 3321.951035] Total swap = 0kB [ 3321.951038] 1965979 pages RAM [ 3321.951040] 0 pages HighMem/MovableOnly [ 3321.951043] 313617 pages reserved [ 3322.959168] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3322.959177] CPU: 0 PID: 17762 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3322.959193] ffff8800b9b1f890 ffffffff81b42e79 1ffff10017363f14 ffff8800b961df00 [ 3322.959205] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800b9b1f9d8 [ 3322.959217] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3322.959219] Call Trace: [ 3322.959243] [] dump_stack+0xc1/0x128 [ 3322.959253] [] warn_alloc.cold.31+0x7f/0x9c [ 3322.959268] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3322.959278] [] ? check_preemption_disabled+0x3b/0x200 [ 3322.959289] [] ? avc_has_perm+0x9e/0x3a0 [ 3322.959298] [] __vmalloc_node_range+0x35e/0x600 [ 3322.959307] [] ? task_has_security+0x130/0x270 [ 3322.959315] [] vmalloc+0x5b/0x70 [ 3322.959324] [] ? sel_write_load+0x135/0xfa0 [ 3322.959333] [] sel_write_load+0x135/0xfa0 [ 3322.959342] [] ? sel_read_bool+0x240/0x240 [ 3322.959351] [] ? trace_hardirqs_on+0x10/0x10 [ 3322.959359] [] ? trace_hardirqs_on+0x10/0x10 [ 3322.959368] [] ? trace_hardirqs_on+0x10/0x10 [ 3322.959376] [] __vfs_write+0x115/0x580 [ 3322.959385] [] ? sel_read_bool+0x240/0x240 [ 3322.959393] [] ? __vfs_read+0x560/0x560 [ 3322.959402] [] ? check_preemption_disabled+0x3b/0x200 [ 3322.959412] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3322.959420] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3322.959429] [] ? __sb_start_write+0x161/0x300 [ 3322.959437] [] vfs_write+0x187/0x520 [ 3322.959445] [] SyS_write+0xd9/0x1c0 [ 3322.959453] [] ? SyS_read+0x1c0/0x1c0 [ 3322.959462] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3322.959470] [] ? SyS_read+0x1c0/0x1c0 [ 3322.959478] [] do_fast_syscall_32+0x2f1/0xa10 [ 3322.959488] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3322.959499] [] entry_SYSENTER_compat+0x90/0xa2 [ 3322.959502] Mem-Info: [ 3322.959524] active_anon:596241 inactive_anon:187669 isolated_anon:0 [ 3322.959524] active_file:5240 inactive_file:45325 isolated_file:0 [ 3322.959524] unevictable:0 dirty:116 writeback:0 unstable:0 [ 3322.959524] slab_reclaimable:8088 slab_unreclaimable:78679 [ 3322.959524] mapped:107458 shmem:208279 pagetables:34848 bounce:0 [ 3322.959524] free:615406 free_pcp:561 free_cma:0 [ 3322.959541] Node 0 active_anon:2384964kB inactive_anon:750676kB active_file:20960kB inactive_file:181300kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429832kB dirty:464kB writeback:0kB shmem:833116kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3322.959566] DMA32 free:2452516kB min:4696kB low:7712kB high:10728kB active_anon:300916kB inactive_anon:93308kB active_file:228kB inactive_file:12412kB unevictable:0kB writepending:76kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3544kB slab_unreclaimable:134672kB kernel_stack:5344kB pagetables:8680kB bounce:0kB free_pcp:1140kB local_pcp:660kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3322.959603] Normal free:9108kB min:5580kB low:9168kB high:12756kB active_anon:2084048kB inactive_anon:657368kB active_file:20732kB inactive_file:168888kB unevictable:0kB writepending:388kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28808kB slab_unreclaimable:180044kB kernel_stack:45760kB pagetables:130712kB bounce:0kB free_pcp:1104kB local_pcp:636kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3322.959689] DMA32: 135*4kB (UME) 99*8kB (UME) 655*16kB (UME) 179*32kB (UME) 187*64kB (UME) 145*128kB (UME) 148*256kB (UME) 42*512kB (UME) 22*1024kB (UME) 10*2048kB (UME) 562*4096kB (UM) = 2452420kB Normal: 2091*4kB (UME) 85*8kB (UM) 4*16kB (UM) 1*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9140kB 258829 total pagecache pages [ 3322.959743] 0 pages in swap cache [ 3322.959748] Swap cache stats: add 0, delete 0, find 0/0 [ 3322.959750] Free swap = 0kB [ 3322.959753] Total swap = 0kB [ 3322.959756] 1965979 pages RAM [ 3322.959758] 0 pages HighMem/MovableOnly [ 3322.959762] 313617 pages reserved 00:27:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x0) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000380)='schedstat\x00') sendfile(r0, r1, 0x0, 0x1) 00:27:15 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 00:27:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:27:15 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) 00:27:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3325.251261] blk_update_request: 251 callbacks suppressed [ 3325.251268] blk_update_request: I/O error, dev loop3, sector 0 [ 3325.262780] blk_update_request: I/O error, dev loop3, sector 4 [ 3325.268802] blk_update_request: I/O error, dev loop3, sector 8 [ 3325.274781] blk_update_request: I/O error, dev loop3, sector 12 [ 3325.280881] blk_update_request: I/O error, dev loop3, sector 16 [ 3325.286966] blk_update_request: I/O error, dev loop3, sector 20 [ 3325.293046] blk_update_request: I/O error, dev loop3, sector 24 00:27:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 3325.299133] blk_update_request: I/O error, dev loop3, sector 28 [ 3325.305230] blk_update_request: I/O error, dev loop3, sector 32 [ 3325.311328] blk_update_request: I/O error, dev loop3, sector 36 00:27:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) 00:27:16 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:16 executing program 5: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setlease(r1, 0x400, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:16 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x36, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 00:27:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 00:27:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:17 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) nanosleep(&(0x7f0000000100), 0x0) tkill(0x0, 0x0) 00:27:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) 00:27:17 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3326.481265] buffer_io_error: 509 callbacks suppressed [ 3326.481272] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3326.494186] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3326.501851] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3326.509510] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3326.517182] Buffer I/O error on dev loop3, logical block 4, lost async page write 00:27:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='T', 0x1, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r1, 0x0) [ 3326.524818] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3326.532480] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3326.540153] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3326.547821] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3326.555458] Buffer I/O error on dev loop3, logical block 9, lost async page write [ 3326.763888] audit_printk_skb: 2313 callbacks suppressed 00:27:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000000301ffff0000000000080000000000000a0015df847a8922eefb4c16c4e0e72187dca59d4779ebb4", @ANYRES32=0x0], 0x30}}, 0x0) [ 3326.763898] audit: type=1400 audit(1546475237.533:202841): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 3326.883112] audit: type=1400 audit(1546475237.653:202842): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2000000000000410, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0x5d, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x21) mkdir(0x0, 0x0) 00:27:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0x0, 0x0) [ 3326.885061] audit: type=1400 audit(1546475237.653:202843): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3326.891971] audit: type=1400 audit(1546475237.663:202844): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3326.893899] audit: type=1400 audit(1546475237.663:202845): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:18 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) fgetxattr(r0, 0x0, 0x0, 0x0) 00:27:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) [ 3326.921255] audit: type=1400 audit(1546475237.693:202846): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:18 executing program 3: pipe2$9p(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000000301ffff0000000000080000000000000a0015df847a8922eefb4c16c4e0e72187dca59d4779ebb4", @ANYRES32=0x0], 0x30}}, 0x0) [ 3326.930947] audit: type=1400 audit(1546475237.703:202847): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3326.950944] audit: type=1400 audit(1546475237.723:202848): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3326.953343] audit: type=1400 audit(1546475237.723:202849): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3326.955538] audit: type=1400 audit(1546475237.723:202850): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3327.259275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 3327.889829] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 00:27:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040), 0x10) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 00:27:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'\x03\x00\x00\x00\x00\x00\xaf\x00', 0x1000e803}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x0, 0x0, 0x0, 0x85c0000000000000, 0x0, 0x9}, 0x1c) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) eventfd(0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:27:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 00:27:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pwritev(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe) 00:27:18 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 00:27:18 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000200)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x141}, 0x0) 00:27:19 executing program 2: mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') chdir(&(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000340)='..', &(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 00:27:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') sendfile(r1, r0, 0x0, 0xca) 00:27:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x2) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000000)) 00:27:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 00:27:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 00:27:19 executing program 1: clone(0x80008000010ff7e, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet6(0xa, 0x0, 0x0) ptrace(0x10, r0) 00:27:22 executing program 4: 00:27:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x2, 0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") 00:27:22 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000440)={0x8}) 00:27:22 executing program 5: 00:27:22 executing program 3: 00:27:22 executing program 1: 00:27:22 executing program 5: 00:27:22 executing program 1: 00:27:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:22 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3331.769327] audit_printk_skb: 1998 callbacks suppressed [ 3331.769336] audit: type=1400 audit(1546475242.533:203516): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:22 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)=0xcfad) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000001, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 3331.780471] audit: type=1400 audit(1546475242.543:203518): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:22 executing program 3: r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r0, r1, 0x0, 0x100000001) sync_file_range(0xffffffffffffffff, 0x73e2, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:27:22 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x1, 0x188) 00:27:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 3331.786069] audit: type=1400 audit(1546475242.553:203519): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3331.791234] audit: type=1400 audit(1546475242.563:203520): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") socketpair(0x18, 0x0, 0x2, 0x0) [ 3331.796096] audit: type=1400 audit(1546475242.563:203521): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") socketpair(0x18, 0x0, 0x0, &(0x7f00000000c0)) [ 3331.800152] audit: type=1400 audit(1546475242.573:203522): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000880)="0adc1f023c123f3188a070") setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @remote}, 0x8) [ 3331.800948] audit: type=1400 audit(1546475242.573:203523): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3331.802226] audit: type=1400 audit(1546475242.573:203524): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3331.804121] audit: type=1400 audit(1546475242.573:203525): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3331.806064] audit: type=1400 audit(1546475242.573:203526): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:24 executing program 5: 00:27:24 executing program 4: 00:27:24 executing program 3: r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r0, r1, 0x0, 0x100000001) sync_file_range(0xffffffffffffffff, 0x0, 0x3, 0x0) 00:27:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000000c0)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:24 executing program 2: 00:27:24 executing program 1: 00:27:24 executing program 1: 00:27:24 executing program 2: 00:27:24 executing program 0: 00:27:24 executing program 4: 00:27:24 executing program 3: 00:27:24 executing program 5: 00:27:24 executing program 1: 00:27:24 executing program 2: 00:27:24 executing program 0: 00:27:24 executing program 3: 00:27:24 executing program 4: 00:27:24 executing program 5: 00:27:24 executing program 1: 00:27:25 executing program 2: 00:27:25 executing program 0: 00:27:25 executing program 3: 00:27:25 executing program 4: 00:27:25 executing program 5: 00:27:25 executing program 1: 00:27:25 executing program 2: 00:27:25 executing program 3: 00:27:25 executing program 0: 00:27:25 executing program 4: 00:27:25 executing program 1: 00:27:25 executing program 5: 00:27:25 executing program 2: 00:27:25 executing program 0: 00:27:25 executing program 3: 00:27:25 executing program 4: 00:27:26 executing program 2: 00:27:26 executing program 1: 00:27:26 executing program 0: 00:27:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x400002000006007, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ext3\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) 00:27:26 executing program 3: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x8000001000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17}) 00:27:26 executing program 4: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, 0x0, &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) 00:27:26 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/sockstat6\x00') close(r0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:27:26 executing program 2: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)) 00:27:26 executing program 5: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:26 executing program 3: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x8000001000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17}) [ 3336.193246] blk_update_request: 639 callbacks suppressed [ 3336.193254] blk_update_request: I/O error, dev loop3, sector 0 [ 3336.204753] buffer_io_error: 380 callbacks suppressed [ 3336.204764] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3336.217729] blk_update_request: I/O error, dev loop3, sector 8 [ 3336.223714] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3336.231384] blk_update_request: I/O error, dev loop3, sector 16 [ 3336.237461] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3336.245107] blk_update_request: I/O error, dev loop3, sector 24 [ 3336.251206] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3336.258865] blk_update_request: I/O error, dev loop3, sector 32 [ 3336.264918] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3336.272569] blk_update_request: I/O error, dev loop3, sector 40 [ 3336.278689] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3336.286350] blk_update_request: I/O error, dev loop3, sector 48 00:27:27 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xd69, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:27:27 executing program 0: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, 0x0, &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3336.292418] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3336.300076] blk_update_request: I/O error, dev loop3, sector 56 [ 3336.306134] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3336.313793] blk_update_request: I/O error, dev loop3, sector 64 [ 3336.319888] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3336.327550] blk_update_request: I/O error, dev loop3, sector 72 [ 3336.333614] Buffer I/O error on dev loop3, logical block 9, lost async page write 00:27:27 executing program 1: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x8000001000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 00:27:27 executing program 4: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='environ\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) 00:27:27 executing program 3: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000040)={'system_u:object_r:dhcpd_initrc_exec_t:s0', 0x20, 'staff_u\x00'}, 0x31) [ 3336.787377] audit_printk_skb: 3960 callbacks suppressed [ 3336.787386] audit: type=1400 audit(1546475247.563:204847): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000000440)={0x6, 0x70, 0x7f, 0x3, 0x2, 0xd8, 0x0, 0x5, 0x36a05, 0xa, 0x8001, 0x4, 0x723, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) fcntl$setstatus(r1, 0x4, 0x3fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$inet6(r0, &(0x7f00000001c0)=""/247, 0xf7, 0x40002101, &(0x7f0000000300)={0xa, 0x4e21, 0x5, @empty, 0x3}, 0x1c) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) pipe(&(0x7f0000000000)) write(r2, &(0x7f0000000380), 0x41ae10cc) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) accept4(r0, 0x0, 0x0, 0x0) 00:27:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz1\x00') write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 3336.788953] audit: type=1400 audit(1546475247.563:204848): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3336.790807] audit: type=1400 audit(1546475247.563:204849): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3336.829319] audit: type=1400 audit(1546475247.603:204851): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3336.829796] audit: type=1400 audit(1546475247.563:204850): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1b) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1) [ 3336.831377] audit: type=1400 audit(1546475247.603:204852): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:28 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\xff\xff\xff\xff\x00', 0x48}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0xe) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 3336.838135] audit: type=1400 audit(1546475247.613:204853): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3336.840206] audit: type=1400 audit(1546475247.613:204854): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:28 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) [ 3336.842436] audit: type=1400 audit(1546475247.613:204855): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3336.842621] audit: type=1400 audit(1546475247.613:204856): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3337.552894] input: syz1 as /devices/virtual/input/input317 [ 3337.599785] input: syz1 as /devices/virtual/input/input318 00:27:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r1, 0x0, 0x0) 00:27:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\xff\xff\xff\xff\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 3338.156766] input: syz1 as /devices/virtual/input/input319 [ 3338.229060] input: syz1 as /devices/virtual/input/input320 00:27:29 executing program 2: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)) 00:27:29 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), 0x4) 00:27:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000740)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') sendfile(r1, r2, 0x0, 0x100000001) syz_open_dev$rtc(0x0, 0x0, 0x0) [ 3338.731547] input: syz1 as /devices/virtual/input/input321 00:27:29 executing program 0: r0 = syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x1987c4bfd9af49d7) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000001c0)={0x33e}) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0x5d, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x5}, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x2) 00:27:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000100)) 00:27:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1b) readv(r1, &(0x7f00000014c0)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1) 00:27:29 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x1c) 00:27:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 00:27:30 executing program 5: socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x3, 0x0, 0x0) 00:27:30 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 00:27:30 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) close(r0) 00:27:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) 00:27:30 executing program 5: socketpair$unix(0x1, 0x8000000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 00:27:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x3b) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffff01, 0x0, 0x0, 0x0) 00:27:30 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x3b) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffff01, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x8001, 0x0) 00:27:31 executing program 0: r0 = syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x1987c4bfd9af49d7) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000001c0)={0x33e}) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0x5d, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x5}, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x2) 00:27:31 executing program 2: 00:27:31 executing program 4: 00:27:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4}) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4}) 00:27:31 executing program 1: 00:27:31 executing program 1: 00:27:31 executing program 2: 00:27:31 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) sendfile(r1, r2, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup(0xffffffffffffffff) 00:27:31 executing program 5: 00:27:32 executing program 2: 00:27:32 executing program 5: [ 3341.812132] audit_printk_skb: 2526 callbacks suppressed [ 3341.812141] audit: type=1400 audit(1546475252.583:205699): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.823735] audit: type=1400 audit(1546475252.593:205700): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.838734] audit: type=1400 audit(1546475252.603:205701): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.840841] audit: type=1400 audit(1546475252.603:205702): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.842744] audit: type=1400 audit(1546475252.603:205703): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.844690] audit: type=1400 audit(1546475252.603:205704): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.876989] audit: type=1400 audit(1546475252.603:205705): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.885988] audit: type=1400 audit(1546475252.653:205706): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.906887] audit: type=1400 audit(1546475252.683:205707): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3341.908977] audit: type=1400 audit(1546475252.683:205708): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:34 executing program 3: 00:27:34 executing program 0: 00:27:34 executing program 1: 00:27:34 executing program 4: 00:27:34 executing program 2: 00:27:34 executing program 5: 00:27:34 executing program 0: 00:27:34 executing program 4: 00:27:34 executing program 5: 00:27:34 executing program 2: 00:27:34 executing program 1: 00:27:34 executing program 0: 00:27:34 executing program 3: 00:27:34 executing program 1: 00:27:34 executing program 5: 00:27:34 executing program 2: 00:27:34 executing program 4: 00:27:35 executing program 5: 00:27:35 executing program 4: 00:27:35 executing program 1: 00:27:35 executing program 0: 00:27:35 executing program 3: 00:27:35 executing program 2: 00:27:35 executing program 5: 00:27:35 executing program 4: 00:27:35 executing program 0: 00:27:35 executing program 1: 00:27:35 executing program 2: 00:27:35 executing program 3: 00:27:35 executing program 5: 00:27:35 executing program 1: 00:27:35 executing program 2: 00:27:35 executing program 4: 00:27:35 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 00:27:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xb713}) 00:27:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\xff\xff\xff\xff\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 00:27:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) ioctl$TCSETA(r0, 0x5406, 0x0) 00:27:36 executing program 2: 00:27:36 executing program 1: 00:27:36 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000003c0)={@broadcast, @local, [{[], {0x8100, 0xffffffff}}], {@mpls_uc={0x8847, {[], @ipv6={0x0, 0x6, "f13843", 0x30, 0x0, 0x0, @loopback, @local, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "a6c014", 0x0, 0x0, 0x0, @local, @local}}}}}}}}, 0x0) 00:27:36 executing program 3: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\xff\xff\xff\xff\x00', 0x48}) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x6e) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 00:27:36 executing program 5: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:36 executing program 1: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3345.906693] input: syz1 as /devices/virtual/input/input323 00:27:36 executing program 0: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 00:27:36 executing program 4: pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x3, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) fsetxattr$security_smack_entry(r1, &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000200)='syz', 0x3, 0x1) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) io_destroy(0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x800, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket(0x0, 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 3346.318377] blk_update_request: 250 callbacks suppressed [ 3346.318385] blk_update_request: I/O error, dev loop3, sector 0 [ 3346.319365] input: syz1 as /devices/virtual/input/input325 [ 3346.335526] buffer_io_error: 250 callbacks suppressed [ 3346.335532] Buffer I/O error on dev loop3, logical block 0, lost async page write [ 3346.348414] blk_update_request: I/O error, dev loop3, sector 8 [ 3346.354387] Buffer I/O error on dev loop3, logical block 1, lost async page write [ 3346.362041] blk_update_request: I/O error, dev loop3, sector 16 [ 3346.368167] Buffer I/O error on dev loop3, logical block 2, lost async page write [ 3346.376300] blk_update_request: I/O error, dev loop3, sector 24 [ 3346.382412] Buffer I/O error on dev loop3, logical block 3, lost async page write [ 3346.390064] blk_update_request: I/O error, dev loop3, sector 32 [ 3346.396639] Buffer I/O error on dev loop3, logical block 4, lost async page write [ 3346.404321] blk_update_request: I/O error, dev loop3, sector 40 [ 3346.410399] Buffer I/O error on dev loop3, logical block 5, lost async page write [ 3346.418077] blk_update_request: I/O error, dev loop3, sector 48 [ 3346.424133] Buffer I/O error on dev loop3, logical block 6, lost async page write [ 3346.431782] blk_update_request: I/O error, dev loop3, sector 56 [ 3346.437865] Buffer I/O error on dev loop3, logical block 7, lost async page write [ 3346.445513] blk_update_request: I/O error, dev loop3, sector 64 [ 3346.451601] Buffer I/O error on dev loop3, logical block 8, lost async page write [ 3346.459268] blk_update_request: I/O error, dev loop3, sector 72 00:27:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) [ 3346.465326] Buffer I/O error on dev loop3, logical block 9, lost async page write [ 3346.503764] input: syz1 as /devices/virtual/input/input326 00:27:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2800, 0x0) close(r0) [ 3346.829551] audit_printk_skb: 2916 callbacks suppressed 00:27:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [], 0xa, "87e153f164f596660a5cfaf471edcdddd91ffe68334c0e05c359f944c928d3e7b62d43e3d1fbd85b827db4ab00d42253ab6617dbfd4595edb7981c8d"}, 0x47) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) [ 3346.829560] audit: type=1400 audit(1546475257.603:206684): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:37 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0xcc}) [ 3346.888369] audit: type=1400 audit(1546475257.653:206685): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:37 executing program 0: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) [ 3346.890514] audit: type=1400 audit(1546475257.653:206686): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3346.918377] audit: type=1400 audit(1546475257.683:206687): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:38 executing program 3: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xced423) write$FUSE_LSEEK(r0, 0x0, 0x0) write$P9_RSTATu(r0, 0x0, 0xffffffffffffffd4) [ 3346.922390] audit: type=1400 audit(1546475257.693:206689): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:38 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000010000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00004edfd0)={0x2b, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0b6300006582620af26c37dface63b787c4dfd3e36cdbc8b0dfa0130cdf70e9a3547ff0eb21a1e7d389176"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) dup2(r1, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x1, 0xfdfd, &(0x7f0000001300)="ef"}) [ 3346.934903] audit: type=1400 audit(1546475257.693:206688): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3346.937803] audit: type=1400 audit(1546475257.713:206690): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3346.945601] audit: type=1400 audit(1546475257.713:206691): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3346.967368] audit: type=1400 audit(1546475257.743:206692): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3346.992979] audit: type=1400 audit(1546475257.763:206694): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x495d, 0x0, 0x8de7d8f023d06bd7}, 0x4) sendto$inet6(r3, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r3, &(0x7f00000092c0), 0x4f, 0x0) [ 3348.110255] binder: 18409:18412 ERROR: BC_REGISTER_LOOPER called without request [ 3348.110263] binder: 18409:18412 unknown command 174228069 [ 3348.110272] binder: 18409:18412 ioctl c0306201 204edfd0 returned -22 [ 3348.125142] binder: release 18409:18412 transaction 560 out, still active [ 3348.125147] binder: undelivered TRANSACTION_COMPLETE [ 3348.131115] binder: send failed reply for transaction 560, target dead 00:27:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000200), 0x4) [ 3348.131128] binder: 18409:18412 ioctl c0306201 200012c0 returned -14 [ 3348.158409] binder: BINDER_SET_CONTEXT_MGR already set [ 3348.158420] binder: 18409:18415 ioctl 40046207 0 returned -16 [ 3348.189860] binder: 18409:18415 ERROR: BC_REGISTER_LOOPER called without request [ 3348.189867] binder: 18409:18415 unknown command 174228069 [ 3348.189876] binder: 18409:18415 ioctl c0306201 204edfd0 returned -22 [ 3348.191349] binder_alloc: 18409: binder_alloc_buf, no vma [ 3348.191368] binder: 18409:18412 transaction failed 29189/-3, size 0-0 line 3136 [ 3348.192563] binder: undelivered TRANSACTION_ERROR: 29189 00:27:39 executing program 2: r0 = syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x1987c4bfd9af49d7) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000001c0)={0x33e}) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0x5d, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x5}, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2) 00:27:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000005}) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB=' '], 0x1) fallocate(r1, 0x20, 0x0, 0x100000000) 00:27:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000100, 0x0, 0x0, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x7, 0x0, 0x0, 'batadv0\x00', 'bcsf0\x00', 'nr0\x00', 'bond_slave_1\x00', @random="0b4207c4610a", [], @dev, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@local}}}}]}]}, 0x180) [ 3348.689732] input: syz1 as /devices/virtual/input/input327 [ 3348.774627] input: syz1 as /devices/virtual/input/input328 00:27:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000580)='pids.current\x00\x99\xa3\xd4\x94\xf6c\x92!53\xdf\xaa\xfc\xff\x19\xc5t\xdfR_\xda#\x81F\xc2f`\x85\xa7\x00\x02\x97%\x0e\xb3fz.\x1f\x93\xb9\x1d\x87\xdd\xcc\x1f\xb60\xcb^\xc6\xd3\x1aD\xf8\xca\xa5\xcej*x\xc1!|\x15:\xcc\xbc+HI\x8c\xa3\xbd\x1d7C\xa3\xb9\xfc:\x88\xbdn\xd5\x00\x00\x00\x00\x00\x00\x00\x00&\xc9%\x93\x869\xfa\x9bM\xa8}0\'^m\x12\xf2\xe0 \bA\xe6\x94\x97T\x8f\xd8\xd7\xe2\x13\xda\x94\x11+\xfd\xa7GZ\x96\x19\x96\rjzz%p\n\xd1\x8aC\x7f\'\xd3\xca5\x11\xd1j\xb8\x13\x16\xc2\xa1\xd2d\xba~\xb3\b5\x8b\xa6\x1ew\xed!\x01\x03\x00\x00\x00\xa5\xf81\xcf\x05\xa2\xec\x7f\xd7=\xce\b\xae=X5b|\xa8\xec\xe3f\t\xf8HCGc`\xb9\x15\x86\x8a\xd9\x10\xb7L\x8d\xcb\xe2\x9f\"G\x9c\x96bD\xf8\xa9l\x878td\x8ee\xeb\x99!t\xbc\xd1jd2\x97C8\xf7>\xd1\xbb\x19\xe1\x92\xa3t\x93\x0ej\xd0\xa3\x8e\x99#\x01Pe\xa6 \xf8\x99\xc3\xa7\x90\x95p0\xca/\xb2\xceOae\x00\xe0\x03\x11\x9b\a\xb8\x82\xefR\xbe{\xdd\x91,,\x9e\xe5\x16`\xe0', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x2009) 00:27:39 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @random="e3512277f661", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf411, 0x0, @dev, @local}, @icmp=@timestamp}}}}, 0x0) 00:27:39 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x611, 0x0) pwritev(r0, &(0x7f00000003c0), 0x273, 0x0) 00:27:39 executing program 0: vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x100000000000001b, 0x0) 00:27:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000400), 0x12) 00:27:40 executing program 3: 00:27:40 executing program 4: 00:27:40 executing program 5: 00:27:40 executing program 1: 00:27:41 executing program 2: 00:27:41 executing program 3: 00:27:41 executing program 0: 00:27:41 executing program 4: 00:27:41 executing program 5: 00:27:41 executing program 1: 00:27:41 executing program 5: 00:27:41 executing program 1: 00:27:41 executing program 3: 00:27:41 executing program 0: 00:27:41 executing program 4: 00:27:41 executing program 3: 00:27:41 executing program 2: 00:27:41 executing program 4: 00:27:41 executing program 5: 00:27:41 executing program 1: 00:27:41 executing program 0: 00:27:41 executing program 3: 00:27:41 executing program 5: 00:27:42 executing program 2: 00:27:42 executing program 4: 00:27:42 executing program 0: 00:27:42 executing program 1: 00:27:42 executing program 3: 00:27:42 executing program 4: 00:27:42 executing program 2: 00:27:42 executing program 5: 00:27:42 executing program 0: 00:27:42 executing program 1: [ 3351.838557] audit_printk_skb: 3093 callbacks suppressed [ 3351.838567] audit: type=1400 audit(1546475262.613:207725): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:42 executing program 3: 00:27:42 executing program 4: 00:27:42 executing program 0: [ 3351.867598] audit: type=1400 audit(1546475262.643:207726): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:42 executing program 2: [ 3351.869462] audit: type=1400 audit(1546475262.643:207727): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:43 executing program 1: 00:27:43 executing program 4: [ 3351.875348] audit: type=1400 audit(1546475262.643:207728): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:43 executing program 3: 00:27:43 executing program 0: [ 3351.877700] audit: type=1400 audit(1546475262.653:207729): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:43 executing program 2: [ 3351.879728] audit: type=1400 audit(1546475262.653:207730): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3351.881816] audit: type=1400 audit(1546475262.653:207731): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3351.883827] audit: type=1400 audit(1546475262.653:207732): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3351.886039] audit: type=1400 audit(1546475262.653:207733): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3351.887785] audit: type=1400 audit(1546475262.663:207734): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x3) 00:27:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) sendfile(r1, r2, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz'}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) 00:27:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x280201, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r2, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000000)={0x31b, 0x699, 0x8, 0x4}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 00:27:43 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x2}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:27:43 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) sendfile(r1, r2, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz'}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup(0xffffffffffffffff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) 00:27:43 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x280201, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x0, 0x0, 0x10000101) pipe2$9p(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, 0x0, 0x0) lseek(r2, 0x0, 0x3) r3 = open$dir(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x4) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x31b, 0x699, 0x8, 0x4}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='./file0\x00') 00:27:44 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) finit_module(r0, 0x0, 0x0) getpgrp(0x0) 00:27:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x102, 0x8001}, 0x20) 00:27:44 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000002400)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 00:27:44 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\xff\xff\xff\xff\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 00:27:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write(r0, &(0x7f0000000380), 0x41ae10cc) 00:27:44 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000240)={0x1, 0x0, 0x6, 0x0, 0x12, 0x0, 0x1f, 0x9, 0x10001, 0x2, 0x7}) ioctl$RTC_UIE_ON(r0, 0x7003) close(r0) flistxattr(r0, &(0x7f0000000040)=""/116, 0x74) 00:27:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4}) 00:27:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4000000000003fb, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") 00:27:44 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00\x00\x00\x00\x03\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200007c0], 0x2, 0x0, &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bc\x00', 's\x01\x000\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xe8}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "2ce719c99cffcbf4d7e80e410bb5007c6981466b6431c7e6b129fcead3f149b589996102627779dc3b23bf8250fc3acd9e8be08a4bbab9be219f504cae3a7e4d"}}}}]}, {0x0, '\x00', 0x1, 0xfffffdfffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1c0) 00:27:44 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) unshare(0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:27:45 executing program 5: pipe(&(0x7f0000000400)={0xffffffffffffffff}) fcntl$getflags(r0, 0x408) 00:27:45 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x2, 0x4, 0x2, 0x0, r0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r1, &(0x7f00000002c0)}, 0x10) 00:27:45 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaaaa08060001080006040002000000000000ac1414bbffffffffffffac1414bbc8355e1c3943098c1fe311910d9b3fd545fff1226b4a537745c6b94c03c978443cbe9a95996b33157d6d079743af89335e51f3916ea7dfe78c1abbd7e63c4064ec0b9e18fdce68daf03453ffd94b158b75a108d9cd5254b1eaf5b6a44cf9c72b0a0e5921a21feda063"], 0x0) 00:27:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x134}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x20, 0x0) 00:27:45 executing program 5: sync() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 00:27:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f0000000200)={0x14}, 0xe1}}, 0x0) getpeername$netlink(r0, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000003ec0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000003f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f40)=0x14, 0x80000) clock_gettime(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r0, &(0x7f000000ad80)=[{{&(0x7f0000005340)=@can, 0x80, &(0x7f0000005680)=[{&(0x7f00000053c0)=""/207, 0xcf}, {&(0x7f00000054c0)=""/188, 0xbc}, {&(0x7f0000005580)=""/231, 0xe7}], 0x3, &(0x7f00000056c0)=""/45, 0x2d}, 0x2}, {{&(0x7f0000005700)=@x25, 0x80, &(0x7f0000005800)=[{&(0x7f0000005780)=""/69, 0x45}], 0x1, &(0x7f0000005840)=""/138, 0x8a}, 0x81}, {{&(0x7f0000005900)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005980)=""/67, 0x43}, {&(0x7f0000005a00)=""/66, 0x42}, {&(0x7f0000005a80)=""/189, 0xbd}, {&(0x7f0000005b40)=""/121, 0x79}], 0x4, &(0x7f0000005c00)=""/80, 0x50}}, {{&(0x7f0000005c80)=@x25={0x9, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005d00)=""/147, 0x93}, {&(0x7f0000005dc0)=""/224, 0xe0}], 0x2, &(0x7f0000005f00)=""/116, 0x74}, 0x9}, {{&(0x7f0000005f80)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006000)=""/36, 0x24}, {&(0x7f0000006040)=""/21, 0x15}, {&(0x7f0000006080)=""/101, 0x65}, {&(0x7f0000006100)=""/50, 0x32}, {&(0x7f0000006140)=""/9, 0x9}, {&(0x7f0000006180)=""/18, 0x12}], 0x6, &(0x7f0000006240)=""/133, 0x85}, 0x2}, {{&(0x7f0000006300)=@nfc_llcp, 0x80, &(0x7f0000007540)=[{&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000007380)=""/39, 0x27}, {&(0x7f00000073c0)=""/173, 0xad}, {&(0x7f0000007480)=""/161, 0xa1}], 0x4, &(0x7f0000007580)=""/239, 0xef}, 0x6}, {{&(0x7f0000007680)=@ethernet={0x0, @local}, 0x80, &(0x7f0000008a00)=[{&(0x7f0000007700)=""/177, 0xb1}, {&(0x7f00000077c0)=""/88, 0x58}, {&(0x7f0000007840)=""/212, 0xd4}, {&(0x7f0000007940)=""/4096, 0x1000}, {&(0x7f0000008940)=""/147, 0x93}], 0x5, &(0x7f0000008a80)=""/104, 0x68}, 0x4}, {{&(0x7f0000008b00)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008b80)=""/149, 0x95}, {&(0x7f0000008c40)=""/131, 0x83}, {&(0x7f0000008d00)=""/4096, 0x1000}, {&(0x7f0000009d00)=""/4096, 0x1000}], 0x4, &(0x7f000000ad40)=""/48, 0x30}, 0x1f}], 0x8, 0x1, &(0x7f000000afc0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000b440)={@initdev}, &(0x7f000000b480)=0x14) accept4(r0, &(0x7f0000011800)=@can, &(0x7f0000011880)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000118c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000011900)={{{@in6=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000011a00)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000011a40)={'dummy0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000011ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000011b00)=0x14) recvmsg(r0, &(0x7f0000012f00)={&(0x7f0000011b40)=@hci, 0x80, &(0x7f0000012e00)=[{&(0x7f0000011bc0)=""/17, 0x11}, {&(0x7f0000011c00)=""/244, 0xf4}, {&(0x7f0000011d00)=""/4096, 0x1000}, {&(0x7f0000012d00)=""/241, 0xf1}], 0x4, &(0x7f0000012e40)=""/178, 0xb2}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000012f40)={@dev}, &(0x7f0000012f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000012fc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000130c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000013240)={0x0, @empty, @dev}, &(0x7f0000013280)=0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 00:27:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000200)="8ce03abead92bfe4b596daa78fc7290626b528b15e292b6c82ff1891868dd3cd765d000757b34f84f8202a77b058c9434ecb6d5a558353a0423c49d4aed1ad74cb61af97af1df14b24556f8cbdf9e4c2e502dd916eb3a33b6049a1231ea03b2331fa811d734034f6190d2089ecfe90adb31f4b731b22c1d904dfd4bea36b72cd9a9d60d4023239114b39873844027a24edb1f0049a6620ebbee9097c4646a0aae7b788312f3c480a5eea0cb63157638c198ca03783b9dcb4e4327bcabcab086a9a8e560fa3f9df258523431a29cd01b00c81f6df407ecf670d", 0x0}, 0x18) 00:27:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x115, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\xff'}}}, 0x30}}, 0x0) 00:27:45 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x0, 0x3, 0x3}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup2(r1, r0) 00:27:45 executing program 1: prctl$PR_CAPBSET_DROP(0x18, 0x25) mknod(&(0x7f0000000080)='./file0\x00', 0x401, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 00:27:46 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="cd2b4a6f35d3d8c6319f200fbcc5934d33f76bae1e4e0e71fb730c8c18d1bb48f7fda90ca1a67a73536bf3436689d33fda96"]], 0x0, 0x0, 0x0}) 00:27:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x0, &(0x7f0000000380)='eth1md5sumvboxnet0,\x00') getpid() capget(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x989, 0x5f5, 0x2, 0x2}) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r2, 0xb) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) lstat(0x0, &(0x7f0000000140)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) 00:27:46 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x4000000000003}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)) 00:27:46 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x200000000000200, 0x5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 3355.763088] binder: 18613:18617 unknown command 536871104 [ 3355.792014] binder: 18613:18617 ioctl c0306201 20000440 returned -22 [ 3355.888536] binder: 18613:18621 unknown command 536871104 [ 3355.888640] binder: BINDER_SET_CONTEXT_MGR already set [ 3355.888648] binder: 18613:18617 ioctl 40046207 0 returned -16 00:27:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f0000000200)={0x14}, 0xe1}}, 0x0) getpeername$netlink(r0, &(0x7f0000002cc0), &(0x7f0000002d00)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000003ec0)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000003f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f40)=0x14, 0x80000) clock_gettime(0xffffffffffffffff, 0xffffffffffffffff) recvmmsg(r0, &(0x7f000000ad80)=[{{&(0x7f0000005340)=@can, 0x80, &(0x7f0000005680)=[{&(0x7f00000053c0)=""/207, 0xcf}, {&(0x7f00000054c0)=""/188, 0xbc}, {&(0x7f0000005580)=""/231, 0xe7}], 0x3, &(0x7f00000056c0)=""/45, 0x2d}, 0x2}, {{&(0x7f0000005700)=@x25, 0x80, &(0x7f0000005800)=[{&(0x7f0000005780)=""/69, 0x45}], 0x1, &(0x7f0000005840)=""/138, 0x8a}, 0x81}, {{&(0x7f0000005900)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000005980)=""/67, 0x43}, {&(0x7f0000005a00)=""/66, 0x42}, {&(0x7f0000005a80)=""/189, 0xbd}, {&(0x7f0000005b40)=""/121, 0x79}], 0x4, &(0x7f0000005c00)=""/80, 0x50}}, {{&(0x7f0000005c80)=@x25={0x9, @remote}, 0x80, &(0x7f0000005ec0)=[{&(0x7f0000005d00)=""/147, 0x93}, {&(0x7f0000005dc0)=""/224, 0xe0}], 0x2, &(0x7f0000005f00)=""/116, 0x74}, 0x9}, {{&(0x7f0000005f80)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006000)=""/36, 0x24}, {&(0x7f0000006040)=""/21, 0x15}, {&(0x7f0000006080)=""/101, 0x65}, {&(0x7f0000006100)=""/50, 0x32}, {&(0x7f0000006140)=""/9, 0x9}, {&(0x7f0000006180)=""/18, 0x12}], 0x6, &(0x7f0000006240)=""/133, 0x85}, 0x2}, {{&(0x7f0000006300)=@nfc_llcp, 0x80, &(0x7f0000007540)=[{&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000007380)=""/39, 0x27}, {&(0x7f00000073c0)=""/173, 0xad}, {&(0x7f0000007480)=""/161, 0xa1}], 0x4, &(0x7f0000007580)=""/239, 0xef}, 0x6}, {{&(0x7f0000007680)=@ethernet={0x0, @local}, 0x80, &(0x7f0000008a00)=[{&(0x7f0000007700)=""/177, 0xb1}, {&(0x7f00000077c0)=""/88, 0x58}, {&(0x7f0000007840)=""/212, 0xd4}, {&(0x7f0000007940)=""/4096, 0x1000}, {&(0x7f0000008940)=""/147, 0x93}], 0x5, &(0x7f0000008a80)=""/104, 0x68}, 0x4}, {{&(0x7f0000008b00)=@hci, 0x80, &(0x7f000000ad00)=[{&(0x7f0000008b80)=""/149, 0x95}, {&(0x7f0000008c40)=""/131, 0x83}, {&(0x7f0000008d00)=""/4096, 0x1000}, {&(0x7f0000009d00)=""/4096, 0x1000}], 0x4, &(0x7f000000ad40)=""/48, 0x30}, 0x1f}], 0x8, 0x1, &(0x7f000000afc0)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000b440)={@initdev}, &(0x7f000000b480)=0x14) accept4(r0, &(0x7f0000011800)=@can, &(0x7f0000011880)=0x80, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000118c0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000011900)={{{@in6=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@remote}}, &(0x7f0000011a00)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000011a40)={'dummy0\x00'}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000011ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000011b00)=0x14) recvmsg(r0, &(0x7f0000012f00)={&(0x7f0000011b40)=@hci, 0x80, &(0x7f0000012e00)=[{&(0x7f0000011bc0)=""/17, 0x11}, {&(0x7f0000011c00)=""/244, 0xf4}, {&(0x7f0000011d00)=""/4096, 0x1000}, {&(0x7f0000012d00)=""/241, 0xf1}], 0x4, &(0x7f0000012e40)=""/178, 0xb2}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000012f40)={@dev}, &(0x7f0000012f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000012fc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000130c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000013240)={0x0, @empty, @dev}, &(0x7f0000013280)=0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 3356.017740] binder: 18613:18621 ioctl c0306201 20000440 returned -22 00:27:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {0x2, 0x0, @multicast1}, {0x2, 0x0, @multicast1}, 0x86}) [ 3356.119676] devpts: called with bogus options [ 3356.207112] devpts: called with bogus options 00:27:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x0, &(0x7f0000000380)='eth1md5sumvboxnet0,\x00') getpid() capget(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x989, 0x5f5, 0x2, 0x2}) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r2, 0xb) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) lstat(0x0, &(0x7f0000000140)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) 00:27:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {0x2, 0x0, @loopback}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}, 0x86}) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000001a40)={'filter\x00', 0x7, 0x4, 0x60, 0x0, 0x160, 0x278, 0x3d8, 0x3d8, 0x3d8, 0x4, &(0x7f0000000780), {[{{@uncond, 0xfffffe63, 0x118}, @unspec=@NFLOG={0x0, 'NFLOG\x00', 0x0, {0x7fffffff, 0x82, 0x100000000, 0x0, 0x0, "a46e644e2b6014184e3e5a44d766f02d76e14257478288051d0f8d7dd56cea1689a4f962cea6caf4f19fafef338ce73bbf7ffb30cf38cddf9e2bf26a6e4da3f9"}}}, {{@arp={@multicast2, @multicast2, 0x0, 0xffffffff, @mac=@local, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@local, {[0xff, 0x0, 0x0, 0xff, 0x0, 0xff]}, 0x5, 0x3, 0x9, 0x3a, 0xfffffffffffffffd, 0x89, 'nr0\x00', 'bridge0\x00', {}, {0xff}, 0x0, 0x186}, 0xfffffeae, 0x140}, @unspec=@CLASSIFY={0x0, 'CLASSIFY\x00', 0x0, {0x20}}}, {{@uncond, 0xfffffe53, 0x140}, @unspec=@NFLOG={0x0, 'NFLOG\x00', 0x0, {0xf64, 0x6, 0x7f, 0x0, 0x0, "852596ee217c22990101f701e7a9e4a53bb8c10be225e1b90948eb16906c15f4a035491be6feca157d23e4db23003e17f2846b1c2133bedc4d234356fbd0fa0c"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0xffffffee) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000, 0x0) 00:27:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x20) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f00000000c0)={{0x3e, @remote, 0x4e21, 0x0, 'ovf\x00', 0x28, 0x7, 0x16}, {@remote, 0x4e20, 0x2000, 0x36e4, 0x8, 0x81}}, 0x44) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000040)={'veth1_to_bond\x00', {0x2, 0x4e20, @loopback}}) r2 = socket$inet(0x2, 0x0, 0x2e2) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e24}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast1}, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000000)={'hsr0\x00', {0x2, 0x4e20, @rand_addr=0x2}}) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000140)={@empty, @multicast1}, &(0x7f0000000180)=0xc) 00:27:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@ethernet={0x0, @local}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/149, 0x95}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f0000000200)=""/76, 0x4c}], 0x3, &(0x7f0000000440)=""/93, 0x5d}, 0x60) listen(r1, 0x7fffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f00000001c0)="a711e9c222edfafa696c1af327", 0xd) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0x1f, 0x100, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'lo\x00', 0x2000}) 00:27:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x1, 0xcd) [ 3356.847960] audit_printk_skb: 3475 callbacks suppressed [ 3356.847973] audit: type=1400 audit(1546475267.623:208894): avc: denied { net_admin } for pid=18651 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) dup3(r0, r1, 0x80000) [ 3356.883449] audit: type=1400 audit(1546475267.653:208895): avc: denied { create } for pid=18647 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:27:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x0, &(0x7f0000000380)='eth1md5sumvboxnet0,\x00') getpid() capget(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x989, 0x5f5, 0x2, 0x2}) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r2, 0xb) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) lstat(0x0, &(0x7f0000000140)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) [ 3356.897882] audit: type=1400 audit(1546475267.663:208896): avc: denied { write } for pid=18647 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:27:48 executing program 3: 00:27:48 executing program 5: [ 3356.907107] audit: type=1400 audit(1546475267.673:208897): avc: denied { net_admin } for pid=18647 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3356.917426] audit: type=1400 audit(1546475267.693:208898): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3356.919502] audit: type=1400 audit(1546475267.693:208899): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:48 executing program 3: 00:27:48 executing program 0: 00:27:48 executing program 5: [ 3356.921796] audit: type=1400 audit(1546475267.693:208900): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:48 executing program 1: [ 3356.923833] audit: type=1400 audit(1546475267.693:208901): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3356.925921] audit: type=1400 audit(1546475267.693:208902): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3356.939854] audit: type=1400 audit(1546475267.713:208903): avc: denied { net_admin } for pid=18659 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3357.001525] devpts: called with bogus options [ 3357.780103] devpts: called with bogus options 00:27:49 executing program 3: 00:27:49 executing program 2: 00:27:49 executing program 5: 00:27:49 executing program 0: 00:27:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='devpts\x00', 0x0, &(0x7f0000000380)='eth1md5sumvboxnet0,\x00') getpid() capget(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x989, 0x5f5, 0x2, 0x2}) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r2, 0xb) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) lstat(0x0, &(0x7f0000000140)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) 00:27:49 executing program 1: 00:27:49 executing program 3: [ 3358.593393] devpts: called with bogus options 00:27:49 executing program 0: 00:27:49 executing program 5: 00:27:49 executing program 2: 00:27:49 executing program 4: 00:27:49 executing program 1: 00:27:49 executing program 3: 00:27:49 executing program 5: 00:27:49 executing program 0: 00:27:50 executing program 2: 00:27:50 executing program 1: 00:27:50 executing program 4: 00:27:50 executing program 3: 00:27:50 executing program 5: 00:27:50 executing program 0: 00:27:50 executing program 2: 00:27:50 executing program 1: 00:27:50 executing program 4: 00:27:50 executing program 3: 00:27:50 executing program 5: 00:27:50 executing program 0: 00:27:50 executing program 2: 00:27:51 executing program 1: 00:27:51 executing program 4: 00:27:51 executing program 3: 00:27:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) creat(0x0, 0x0) 00:27:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 00:27:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') lseek(r0, 0x0, 0x0) 00:27:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:27:51 executing program 4: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x5, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:51 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 00:27:51 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, "0066a393c75a7f6403992361ef2169d5a29302a0d70996324b9d9899406547ee1125bce1cc1a842ca431904165592a720a4ceec337fdabe739eaaab959e3b1f4", "e700f2372ca5f4ceee0399fa5cda91a5020ee508a17e260fd8b37d6a2f83eba9b19354ff49c1dbccbfc5b644876bc6255374f449e36b5f432fb83a83f341caf5", "4b4fea50fbfbfc851969b4a0c32ed906194d1e469a93393a695cee57b12a132b"}) 00:27:51 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)={0x0, 0xfc7f}) 00:27:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:27:51 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/net\x00') 00:27:52 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:27:52 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffffffffffffffd}) 00:27:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0x284ea92c5e2cee3a) 00:27:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:27:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 3361.891914] audit_printk_skb: 3784 callbacks suppressed 00:27:52 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xd69, 0x3e}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x4000000000002000, 0x0) [ 3361.891938] audit: type=1400 audit(1546475272.663:210167): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:52 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 00:27:52 executing program 2: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) stat(0x0, 0x0) getgroups(0x0, 0x0) 00:27:52 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) [ 3361.929922] audit: type=1400 audit(1546475272.703:210168): avc: denied { validate_trans } for pid=18783 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 [ 3361.998153] audit: type=1400 audit(1546475272.773:210169): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3362.000142] audit: type=1400 audit(1546475272.773:210170): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3362.003923] audit: type=1400 audit(1546475272.773:210171): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:53 executing program 0: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000180)='./file0\x00', 0xff7, 0x0) socket$packet(0x11, 0x0, 0x300) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000c00)=[&(0x7f0000000540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000001c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000001ac0)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xdd\x1c\x153\x03\x06\xe1\x88<\xda\x01\xbc\x9e\x8b\xacb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\xe5A\xd9\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xd2\xf1f\xca\x04*\xec\x19\xe6b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001280)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfa\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xe4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) [ 3362.026593] audit: type=1400 audit(1546475272.793:210172): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, 0x0, 0xfffffffffffffdb3) 00:27:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x3ff, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), 0x0, 0x3}, 0x20) 00:27:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000000080)=0x3, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x1) shutdown(r0, 0x1) 00:27:53 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) [ 3362.028645] audit: type=1400 audit(1546475272.803:210173): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3362.044727] audit: type=1400 audit(1546475272.813:210175): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3362.044880] audit: type=1400 audit(1546475272.813:210174): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:53 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) [ 3362.046766] audit: type=1400 audit(1546475272.823:210176): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3362.842872] input: syz1 as /devices/virtual/input/input331 00:27:54 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000f1762800000000000000fb8012e6dd29ee7c00"], 0x1}}, 0x0) [ 3363.376557] input: syz1 as /devices/virtual/input/input333 00:27:54 executing program 5: r0 = socket$inet6(0x10, 0x400000000003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000002aff0)=[{&(0x7f0000010000)="5500000020007fafb72d13b2a4a2809302000000030343026c26236925000400fd7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d544000000006800f75ae583de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 00:27:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x4000400000000001, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./bus\x00') close(r2) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{&(0x7f0000000240)=@ipx={0x4, 0xa2, 0xfffffffffffffffb, "927859abb7ef", 0x9}, 0x80, 0x0}, 0x7}], 0x1, 0xc000) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 00:27:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) read(r0, 0x0, 0x0) [ 3363.466741] input: syz1 as /devices/virtual/input/input334 00:27:54 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:54 executing program 5: syz_emit_ethernet(0x42, &(0x7f00000002c0)={@remote, @empty, [{}], {@mpls_uc={0x8847, {[], @ipv6={0x0, 0x6, "681b94", 0x8, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x0) 00:27:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x5, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) write(r1, &(0x7f0000000080)="6e40d85fe99d", 0x6) [ 3364.036653] input: syz1 as /devices/virtual/input/input336 00:27:54 executing program 0: clone(0x2902001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000200)=0x4, 0x4) bind$netlink(r2, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x2ffffffff}, 0x281) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r3, &(0x7f0000000500)=""/250, 0xebafea1) fchdir(r2) r5 = creat(&(0x7f0000000400)='./file0\x00', 0x104) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f00000004c0)={0x3da, 0x1, 0x0, {0x9}}, 0x1c9) ioctl$TIOCGLCKTRMIOS(r4, 0x5456, &(0x7f0000000380)={0x3, 0x100000001, 0x0, 0xffffffffffff8000, 0x100, 0x80000001, 0x7, 0x4, 0x8, 0x8001, 0x800, 0x56}) write$cgroup_int(r5, &(0x7f0000000080)=0x80, 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x6100) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='.0\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1ff) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) lseek(r7, 0x0, 0x2) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) 00:27:55 executing program 4: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000140)='sit0\x00') 00:27:55 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000140)='sit0\x00') 00:27:55 executing program 3: write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:55 executing program 1: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x800000200000, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0x40, &(0x7f0000000ffc), 0x0) getcwd(0x0, 0x0) [ 3364.598722] keychord: Insufficient bytes present for keycount 0 [ 3364.677191] keychord: Insufficient bytes present for keycount 0 00:27:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) fcntl$getown(0xffffffffffffffff, 0x9) 00:27:55 executing program 4: 00:27:55 executing program 5: 00:27:55 executing program 3: write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:56 executing program 1: 00:27:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) fcntl$getown(0xffffffffffffffff, 0x9) 00:27:56 executing program 4: 00:27:56 executing program 0: 00:27:56 executing program 5: 00:27:56 executing program 3: write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:56 executing program 1: 00:27:56 executing program 5: 00:27:56 executing program 4: 00:27:56 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) fcntl$getown(0xffffffffffffffff, 0x9) 00:27:56 executing program 1: 00:27:56 executing program 0: 00:27:57 executing program 5: 00:27:57 executing program 4: 00:27:57 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:57 executing program 1: 00:27:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) fcntl$getown(0xffffffffffffffff, 0x9) 00:27:57 executing program 0: 00:27:57 executing program 4: 00:27:57 executing program 5: 00:27:57 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:57 executing program 1: [ 3366.906886] audit_printk_skb: 3436 callbacks suppressed [ 3366.906895] audit: type=1400 audit(1546475277.683:211325): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:57 executing program 5: [ 3366.911552] audit: type=1400 audit(1546475277.683:211326): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:57 executing program 0: 00:27:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:27:57 executing program 3: openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) [ 3366.916741] audit: type=1400 audit(1546475277.683:211327): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:58 executing program 1: [ 3366.918302] audit: type=1400 audit(1546475277.683:211328): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:58 executing program 5: [ 3366.919754] audit: type=1400 audit(1546475277.683:211329): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:58 executing program 0: 00:27:58 executing program 3: openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) [ 3366.921235] audit: type=1400 audit(1546475277.683:211330): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3366.922673] audit: type=1400 audit(1546475277.683:211331): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3366.924395] audit: type=1400 audit(1546475277.683:211332): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3366.925862] audit: type=1400 audit(1546475277.683:211333): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3366.928011] audit: type=1400 audit(1546475277.663:211324): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:27:58 executing program 4: 00:27:58 executing program 3: openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(0xffffffffffffffff, &(0x7f00000001c0)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'system_u:object_r:memory_device_t:s0', 0x20, 0x0, 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}, 0x12d) 00:27:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:27:58 executing program 1: 00:27:58 executing program 0: 00:27:58 executing program 5: 00:27:59 executing program 1: 00:27:59 executing program 0: 00:27:59 executing program 5: 00:27:59 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, 0x0, 0x0) 00:27:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:27:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='personality\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40400, 0x0) dup3(r0, r1, 0x80000) 00:27:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:27:59 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 00:27:59 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:27:59 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, 0x0, 0x0) 00:27:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:27:59 executing program 4: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000540)=""/246) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:27:59 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 00:27:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)) 00:27:59 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, 0x0, 0x0) 00:27:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) 00:28:00 executing program 4: socketpair$unix(0x1, 0x1000000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) 00:28:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffd605}) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffc}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 00:28:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0xfffffffffffff6a5}) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)) 00:28:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 00:28:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) INIT: Id "5" respawning too fast: disabled for 5 minutes 00:28:00 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(0x0, &(0x7f0000000080)) 00:28:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) 00:28:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0xe62d}) 00:28:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udplite6\x00') preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x47) 00:28:01 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)={0x5}) INIT: Id "6" respawning too fast: disabled for 5 minutes 00:28:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0x9, &(0x7f0000000200)=0x0) r3 = creat(&(0x7f0000000440)='./bus\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r3, 0x48204) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008000)=[{{0x0, 0x0, &(0x7f0000001880)=[{0x0}], 0x1}}], 0x1, 0x0, &(0x7f0000004fc0)) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:28:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x4000000003, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) sendmsg(r1, &(0x7f0000000780)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="b07202537ae26818150a7e18d3ef44b5", 0x10}], 0x1}, 0x20004050) 00:28:01 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x401c5820, 0x20000001) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r1, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 00:28:01 executing program 5: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:28:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f00000002c0), 0x0}, 0x18) 00:28:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x3b) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffff01, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x8001, 0x0) [ 3371.120525] selinux_nlmsg_perm: 166 callbacks suppressed [ 3371.120535] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57978 sclass=netlink_route_socket pig=19066 comm=syz-executor1 00:28:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, 0xab852ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)='syz_tun\x00'}) [ 3371.254552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57978 sclass=netlink_route_socket pig=19066 comm=syz-executor1 00:28:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000200)='ppp0)^\x00', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) close(r2) read$FUSE(r1, &(0x7f00000005c0), 0x1000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 00:28:02 executing program 3: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x401c5820, 0x20000001) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r1, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 00:28:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffd, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c832, 0xffffffffffffffff, 0x0) [ 3371.928244] audit_printk_skb: 3591 callbacks suppressed [ 3371.928253] audit: type=1400 audit(1546475282.703:212532): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:02 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000940)={0x14, 0x22, 0x201}, 0x14}}, 0x0) [ 3371.980831] audit: type=1400 audit(1546475282.753:212533): avc: denied { map_create } for pid=19092 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3371.987473] audit: type=1400 audit(1546475282.763:212534): avc: denied { map_create } for pid=19092 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 3372.005116] audit: type=1400 audit(1546475282.773:212535): avc: denied { net_admin } for pid=19087 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:03 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 00:28:03 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000940)={0x14, 0x22, 0x201}, 0x14}}, 0x0) 00:28:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000200)='ppp0)^\x00', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) close(r2) read$FUSE(r1, &(0x7f00000005c0), 0x1000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') [ 3372.034991] audit: type=1400 audit(1546475282.803:212536): avc: denied { create } for pid=19087 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:28:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) [ 3372.041995] audit: type=1400 audit(1546475282.813:212537): avc: denied { write } for pid=19087 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3372.121451] audit: type=1400 audit(1546475282.893:212538): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:03 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) [ 3372.123356] audit: type=1400 audit(1546475282.893:212539): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3372.171109] audit: type=1400 audit(1546475282.943:212540): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3372.210978] audit: type=1400 audit(1546475282.983:212541): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes 00:28:05 executing program 5: 00:28:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000200)='ppp0)^\x00', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) close(r2) read$FUSE(r1, &(0x7f00000005c0), 0x1000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 00:28:05 executing program 4: 00:28:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffd, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c832, 0xffffffffffffffff, 0x0) 00:28:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:05 executing program 4: 00:28:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:05 executing program 0: 00:28:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000200)='ppp0)^\x00', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) close(r2) read$FUSE(r1, &(0x7f00000005c0), 0x1000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) close(r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 00:28:05 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) INIT: Id "4" respawning too fast: disabled for 5 minutes 00:28:05 executing program 4: 00:28:05 executing program 5: INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes 00:28:06 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 00:28:06 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "d294167d40e64df9f8c210ac1f30c08718be703467c74385c8af3b0cf68a2050"}) 00:28:06 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) lseek(r0, 0x400000, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$P9_RUNLINKAT(r0, &(0x7f00000001c0)={0x7}, 0x7) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(r1, &(0x7f0000000180)='v', 0x1) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000280)={0x0, 0x10100}) 00:28:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) mkdir(&(0x7f0000000640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 00:28:06 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000180)=0xfff0000100000003) 00:28:06 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r0, 0x2) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:06 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:06 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 00:28:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @multicast1}, 0x86}) 00:28:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000340)=""/232, &(0x7f0000000000)=0xe8) 00:28:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:07 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) [ 3376.526199] SELinux: truncated policydb string identifier 00:28:07 executing program 3: mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:07 executing program 5: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x5, 0x0, 0x0, 0x0, 0x2}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:28:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) tkill(0x0, 0x0) 00:28:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000300)="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", 0x218, 0x8000, 0x0, 0x0) close(r1) [ 3376.942450] audit_printk_skb: 2598 callbacks suppressed 00:28:07 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) [ 3376.942459] audit: type=1400 audit(1546475287.713:213408): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3376.948354] audit: type=1400 audit(1546475287.723:213409): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') pread64(r0, &(0x7f0000000000)=""/97, 0x61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x81) [ 3376.955739] audit: type=1400 audit(1546475287.723:213410): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000240)=""/175, 0xaf, 0x10000, &(0x7f00000000c0)={0xa, 0x4e23, 0x8, @mcast1, 0x7}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x8008200) mknod(&(0x7f0000000500)='./bus\x00', 0xc000, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) set_robust_list(&(0x7f0000000200)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, 0xc) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB="6debf8c72ef400000000"], 0x1) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) lseek(r5, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'\x00\x00\x00\x02\xdf\x01\x00', 0x40f}) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r3, r6, &(0x7f0000d83ff8), 0x0) sendfile64(r1, r2, &(0x7f0000000380), 0x1) timer_create(0x7, &(0x7f0000000000), 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0xe7f3, {{0x2, 0x4e20, @broadcast}}}, 0x84) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x325082, 0x0) [ 3376.958239] audit: type=1400 audit(1546475287.733:213411): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) [ 3376.959250] SELinux: truncated policydb string identifier [ 3376.960212] audit: type=1400 audit(1546475287.733:213412): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) [ 3376.962273] audit: type=1400 audit(1546475287.733:213413): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3376.964280] audit: type=1400 audit(1546475287.733:213414): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x7fc) [ 3376.977169] audit: type=1400 audit(1546475287.753:213416): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) [ 3376.979141] audit: type=1400 audit(1546475287.753:213417): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3376.981039] audit: type=1400 audit(1546475287.753:213418): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3377.508253] SELinux: truncated policydb string identifier [ 3378.012235] SELinux: truncated policydb string identifier 00:28:09 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:09 executing program 3: mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x7fc) 00:28:09 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000240)=""/175, 0xaf, 0x10000, &(0x7f00000000c0)={0xa, 0x4e23, 0x8, @mcast1, 0x7}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x8008200) mknod(&(0x7f0000000500)='./bus\x00', 0xc000, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) set_robust_list(&(0x7f0000000200)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, 0xc) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB="6debf8c72ef400000000"], 0x1) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) lseek(r5, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'\x00\x00\x00\x02\xdf\x01\x00', 0x40f}) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007fff) sendfile(r3, r6, &(0x7f0000d83ff8), 0x0) sendfile64(r1, r2, &(0x7f0000000380), 0x1) timer_create(0x7, &(0x7f0000000000), 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0xe7f3, {{0x2, 0x4e20, @broadcast}}}, 0x84) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x325082, 0x0) 00:28:09 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) 00:28:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') sendfile(r0, r0, 0x0, 0x7fc) 00:28:09 executing program 3: mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:09 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100), 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) 00:28:10 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1e, &(0x7f0000000080)={@link_local, @empty, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "911aab5cc21f21b9"}}}}, 0x0) 00:28:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x50) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgrp(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 00:28:10 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) 00:28:10 executing program 1: 00:28:11 executing program 3: creat(0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:11 executing program 5: 00:28:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:11 executing program 1: 00:28:11 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) 00:28:11 executing program 5: 00:28:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:11 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:11 executing program 1: 00:28:11 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) 00:28:12 executing program 5: 00:28:12 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:12 executing program 1: [ 3381.398943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 00:28:12 executing program 5: 00:28:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:12 executing program 1: 00:28:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) fcntl$getown(r0, 0x9) write(r0, &(0x7f0000000180)="c6e25a13d2117b009d212c7f437657fc58f784e8aea1d279d5347506f74c8b23", 0x20) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) [ 3381.948678] audit_printk_skb: 3279 callbacks suppressed [ 3381.948687] audit: type=1400 audit(1546475292.723:214512): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3381.949595] audit: type=1400 audit(1546475292.723:214513): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:12 executing program 1: 00:28:12 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 00:28:12 executing program 5: 00:28:12 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) [ 3381.959319] audit: type=1400 audit(1546475292.723:214514): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd) [ 3381.960543] audit: type=1400 audit(1546475292.723:214515): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3381.970242] audit: type=1400 audit(1546475292.723:214516): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:13 executing program 5: 00:28:13 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:13 executing program 1: [ 3381.971352] audit: type=1400 audit(1546475292.723:214517): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) ftruncate(r0, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) [ 3381.979698] audit: type=1400 audit(1546475292.753:214518): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3381.980986] audit: type=1400 audit(1546475292.753:214519): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:13 executing program 5: 00:28:13 executing program 1: [ 3381.981750] audit: type=1400 audit(1546475292.753:214520): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3381.982348] audit: type=1400 audit(1546475292.753:214521): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) connect$inet6(r2, &(0x7f0000000500)={0xa, 0x0, 0xff, @mcast2, 0x7ff}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) 00:28:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 00:28:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', 0x0, &(0x7f0000000100)='fuseblk\x00', 0x1000003, 0x0) 00:28:14 executing program 5: 00:28:14 executing program 1: 00:28:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000003, 0x0) 00:28:14 executing program 5: 00:28:14 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000180)=0x6, 0x4) 00:28:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000004c0)={0x5, 0x0, 0x6, 0x80000000, 0x1}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) [ 3384.023005] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3384.084791] CPU: 1 PID: 19391 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3384.091817] ffff8800a4bcf890 ffffffff81b42e79 1ffff10014979f14 ffff8800a45adf00 [ 3384.099887] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a4bcf9d8 [ 3384.107971] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3384.116035] Call Trace: [ 3384.118632] [] dump_stack+0xc1/0x128 [ 3384.123998] [] warn_alloc.cold.31+0x7f/0x9c [ 3384.129971] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3384.136635] [] ? check_preemption_disabled+0x3b/0x200 [ 3384.143477] [] ? avc_has_perm+0x9e/0x3a0 [ 3384.149189] [] __vmalloc_node_range+0x35e/0x600 [ 3384.155517] [] ? task_has_security+0x130/0x270 [ 3384.161751] [] vmalloc+0x5b/0x70 [ 3384.166762] [] ? sel_write_load+0x135/0xfa0 [ 3384.172727] [] sel_write_load+0x135/0xfa0 [ 3384.178522] [] ? sel_read_bool+0x240/0x240 [ 3384.184418] [] ? trace_hardirqs_on+0x10/0x10 [ 3384.190474] [] ? trace_hardirqs_on+0x10/0x10 [ 3384.196527] [] ? trace_hardirqs_on+0x10/0x10 [ 3384.202606] [] __vfs_write+0x115/0x580 [ 3384.208138] [] ? sel_read_bool+0x240/0x240 [ 3384.214015] [] ? __vfs_read+0x560/0x560 [ 3384.219635] [] ? check_preemption_disabled+0x3b/0x200 [ 3384.226482] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3384.233320] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3384.239905] [] ? __sb_start_write+0x161/0x300 [ 3384.246066] [] vfs_write+0x187/0x520 [ 3384.251429] [] SyS_write+0xd9/0x1c0 [ 3384.256698] [] ? SyS_read+0x1c0/0x1c0 [ 3384.262144] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3384.268373] [] ? SyS_read+0x1c0/0x1c0 [ 3384.273818] [] do_fast_syscall_32+0x2f1/0xa10 00:28:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xba9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = geteuid() r3 = openat(r1, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) get_thread_area(&(0x7f0000000440)={0xa, 0x20000000, 0x3000, 0x0, 0xfffffffffffffffa, 0x0, 0x100000001, 0x62, 0x0, 0x80000000}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000004c0)={0x0, @broadcast, 0x4e23, 0x1, 'lblcr\x00', 0x5, 0x7, 0x40}, 0x2c) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x0, 0x7, 0x8, 0x9, 0xc1f, 0x8}, 0x1d4) socket$inet(0x2, 0x2, 0x8) [ 3384.279965] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3384.286641] [] entry_SYSENTER_compat+0x90/0xa2 00:28:15 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) 00:28:15 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000003, 0x0) 00:28:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) [ 3384.852966] device lo entered promiscuous mode [ 3384.936840] device lo left promiscuous mode [ 3385.289905] Mem-Info: [ 3385.308323] active_anon:599342 inactive_anon:187543 isolated_anon:0 [ 3385.308323] active_file:5245 inactive_file:45360 isolated_file:0 [ 3385.308323] unevictable:0 dirty:149 writeback:0 unstable:0 [ 3385.308323] slab_reclaimable:8171 slab_unreclaimable:79851 [ 3385.308323] mapped:107483 shmem:208157 pagetables:35092 bounce:0 [ 3385.308323] free:610623 free_pcp:582 free_cma:0 [ 3385.357822] Node 0 active_anon:2397368kB inactive_anon:750172kB active_file:20980kB inactive_file:181440kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429832kB dirty:596kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3385.386489] DMA32 free:2433364kB min:4696kB low:7712kB high:10728kB active_anon:312068kB inactive_anon:92808kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:40kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3708kB slab_unreclaimable:141612kB kernel_stack:5600kB pagetables:8920kB bounce:0kB free_pcp:1276kB local_pcp:636kB free_cma:0kB [ 3385.424375] lowmem_reserve[]: 0 3505 3505 [ 3385.434949] Normal free:9216kB min:5580kB low:9168kB high:12756kB active_anon:2085136kB inactive_anon:657368kB active_file:20732kB inactive_file:169008kB unevictable:0kB writepending:568kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:29008kB slab_unreclaimable:177712kB kernel_stack:45728kB pagetables:131352kB bounce:0kB free_pcp:1224kB local_pcp:588kB free_cma:0kB [ 3385.471530] lowmem_reserve[]: 0 0 0 [ 3385.477628] DMA32: 917*4kB (UME) 515*8kB (UME) 585*16kB (UME) 84*32kB (UME) 88*64kB (UME) 190*128kB (UME) 182*256kB (UME) 75*512kB (UME) 51*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2433660kB [ 3385.541006] Normal: 2296*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9184kB 258763 total pagecache pages [ 3385.582074] 0 pages in swap cache [ 3385.586536] Swap cache stats: add 0, delete 0, find 0/0 00:28:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 00:28:16 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1000003, 0x0) 00:28:16 executing program 5: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 3385.595385] Free swap = 0kB [ 3385.600754] Total swap = 0kB [ 3385.605394] 1965979 pages RAM [ 3385.610564] 0 pages HighMem/MovableOnly [ 3385.616435] 313617 pages reserved 00:28:16 executing program 1: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 00:28:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) 00:28:16 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) [ 3385.771327] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3385.843516] CPU: 1 PID: 19426 Comm: syz-executor5 Not tainted 4.9.141+ #23 [ 3385.850541] ffff880143e4f890 ffffffff81b42e79 1ffff100287c9f14 ffff8801cffc5f00 [ 3385.858609] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff880143e4f9d8 [ 3385.866676] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3385.874755] Call Trace: [ 3385.877341] [] dump_stack+0xc1/0x128 [ 3385.882701] [] warn_alloc.cold.31+0x7f/0x9c [ 3385.888677] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3385.895337] [] ? check_preemption_disabled+0x3b/0x200 [ 3385.902172] [] ? avc_has_perm+0x9e/0x3a0 [ 3385.907885] [] __vmalloc_node_range+0x35e/0x600 [ 3385.914204] [] ? task_has_security+0x130/0x270 [ 3385.920434] [] vmalloc+0x5b/0x70 [ 3385.925444] [] ? sel_write_load+0x135/0xfa0 [ 3385.931422] [] sel_write_load+0x135/0xfa0 [ 3385.937219] [] ? sel_read_bool+0x240/0x240 [ 3385.943097] [] ? trace_hardirqs_on+0x10/0x10 [ 3385.949148] [] ? trace_hardirqs_on+0x10/0x10 [ 3385.955229] [] ? trace_hardirqs_on+0x10/0x10 [ 3385.961281] [] __vfs_write+0x115/0x580 [ 3385.966812] [] ? sel_read_bool+0x240/0x240 [ 3385.972700] [] ? __vfs_read+0x560/0x560 [ 3385.978319] [] ? check_preemption_disabled+0x3b/0x200 [ 3385.985154] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3385.991993] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3385.998568] [] ? __sb_start_write+0x161/0x300 [ 3386.004706] [] vfs_write+0x187/0x520 [ 3386.010063] [] SyS_write+0xd9/0x1c0 [ 3386.015340] [] ? SyS_read+0x1c0/0x1c0 [ 3386.020788] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3386.027016] [] ? SyS_read+0x1c0/0x1c0 [ 3386.032463] [] do_fast_syscall_32+0x2f1/0xa10 00:28:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket(0x2, 0x803, 0xff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getpgid(0xffffffffffffffff) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x17) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 00:28:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) [ 3386.038605] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3386.045263] [] entry_SYSENTER_compat+0x90/0xa2 00:28:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0x8) 00:28:17 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) [ 3386.959120] audit_printk_skb: 2751 callbacks suppressed [ 3386.959129] audit: type=1400 audit(1546475297.733:215440): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 00:28:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x1, 0x1}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) 00:28:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x8) 00:28:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001900010700000000000000000a4f31f2b0df0000000000000055da0df1762979438ef93b3c000000001400053287eff825aa7a1adcae26b3aa7ad5237584e3f87260ccd8537c3f4e2d968f1a8de156f9fb097892d2eb6fb85bcc3db43f7e17f083e4e722fc041fc021"], 0x1}}, 0x0) [ 3386.964387] audit: type=1400 audit(1546475297.733:215441): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, 0x0, 0x0) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) write$apparmor_current(r1, &(0x7f0000000100)=@profile={'permprofile ', 'syz'}, 0xf) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) [ 3386.968191] audit: type=1400 audit(1546475297.743:215442): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:18 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00'}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800), 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) syz_extract_tcp_res(&(0x7f00000004c0)={0x41424344, 0x41424344}, 0x0, 0x1f) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000500)={@val, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv4={{0x19, 0x4, 0x0, 0x0, 0xb9, 0x66, 0x3f, 0xffffffffffffff80, 0x16, 0x0, @broadcast, @dev, {[@timestamp={0x44, 0x20, 0x1, 0x0, 0x3, [{[@local], 0x4}, {[], 0x400}, {[], 0x9}, {}, {[], 0x7}, {[], 0x3}]}, @end, @lsrr={0x83, 0x1f, 0x1, [@empty, @loopback, @multicast2, @empty, @loopback, @rand_addr=0x6, @broadcast]}, @ssrr={0x89, 0xf, 0x9, [@loopback, @empty, @local]}]}}, @tcp={{0x4e24, 0x4e20, 0x41424344, r4, 0x67de, 0x0, 0x8, 0x18, 0x5, 0x0, 0xfffffffffffffff9, {[@exp_fastopen={0xfe, 0x9, 0xf989, "d0c53480ac"}]}}, {"0bd2a61ae2afbb1e2d8b012191c0b8b9a69ee09275b2fd5897d4b52b6c8ee4da7ac3968fb4575e1da000b2dd57370f1b7a9110b717"}}}}}, 0xc7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @empty, 0x6}, {0xa, 0x4e24, 0x101, @local, 0x7f}, 0x6e0, [0x5, 0x2, 0x8000, 0x80000001, 0x5, 0x8, 0x4, 0x3]}, 0x5c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620c, 0x0) [ 3386.970197] audit: type=1400 audit(1546475297.743:215443): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:18 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000000c0)={0x9}) 00:28:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[], 0x0) [ 3386.972215] audit: type=1400 audit(1546475297.743:215444): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3386.986071] audit: type=1400 audit(1546475297.723:215439): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) setsockopt$inet6_int(r2, 0x29, 0xcf, &(0x7f0000000840), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r3, &(0x7f00000000c0)=0x202, 0xdd) [ 3386.991598] audit: type=1400 audit(1546475297.753:215445): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3386.996121] audit: type=1400 audit(1546475297.753:215446): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3386.999214] audit: type=1400 audit(1546475297.753:215447): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3387.008048] audit: type=1400 audit(1546475297.783:215448): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3387.057697] Mem-Info: [ 3387.057721] active_anon:599312 inactive_anon:187543 isolated_anon:0 [ 3387.057721] active_file:5245 inactive_file:45366 isolated_file:0 [ 3387.057721] unevictable:0 dirty:71 writeback:0 unstable:0 [ 3387.057721] slab_reclaimable:8171 slab_unreclaimable:79568 [ 3387.057721] mapped:107462 shmem:208157 pagetables:35067 bounce:0 [ 3387.057721] free:610910 free_pcp:639 free_cma:0 [ 3387.057738] Node 0 active_anon:2397248kB inactive_anon:750172kB active_file:20980kB inactive_file:181464kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429848kB dirty:284kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3387.057763] DMA32 free:2434496kB min:4696kB low:7712kB high:10728kB active_anon:312180kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:20kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3676kB slab_unreclaimable:140696kB kernel_stack:5504kB pagetables:8788kB bounce:0kB free_pcp:1140kB local_pcp:652kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3387.057797] Normal free:9144kB min:5580kB low:9168kB high:12756kB active_anon:2085168kB inactive_anon:657368kB active_file:20732kB inactive_file:169020kB unevictable:0kB writepending:264kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:29008kB slab_unreclaimable:177576kB kernel_stack:45760kB pagetables:131480kB bounce:0kB free_pcp:1416kB local_pcp:720kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3387.057863] DMA32: 930*4kB (UME) 520*8kB (UME) 585*16kB (UME) 102*32kB (UME) 90*64kB (UME) 190*128kB (UME) 182*256kB (UME) 75*512kB (UME) 51*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434456kB Normal: 2298*4kB (U) 0*8kB 0*16kB 3*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9288kB 258767 total pagecache pages [ 3387.057907] 0 pages in swap cache [ 3387.057911] Swap cache stats: add 0, delete 0, find 0/0 [ 3387.057913] Free swap = 0kB [ 3387.057916] Total swap = 0kB [ 3387.057918] 1965979 pages RAM [ 3387.057921] 0 pages HighMem/MovableOnly [ 3387.057923] 313617 pages reserved [ 3387.058653] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3387.058676] CPU: 1 PID: 19434 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3387.058694] ffff8800af47f890 ffffffff81b42e79 1ffff10015e8ff14 ffff8801cffbc740 [ 3387.058707] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800af47f9d8 [ 3387.058720] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3387.058722] Call Trace: [ 3387.058744] [] dump_stack+0xc1/0x128 [ 3387.058757] [] warn_alloc.cold.31+0x7f/0x9c [ 3387.058769] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3387.058779] [] ? check_preemption_disabled+0x3b/0x200 [ 3387.058790] [] ? avc_has_perm+0x9e/0x3a0 [ 3387.058801] [] __vmalloc_node_range+0x35e/0x600 [ 3387.058812] [] ? task_has_security+0x130/0x270 [ 3387.058820] [] vmalloc+0x5b/0x70 [ 3387.058829] [] ? sel_write_load+0x135/0xfa0 [ 3387.058837] [] sel_write_load+0x135/0xfa0 [ 3387.058847] [] ? sel_read_bool+0x240/0x240 [ 3387.058856] [] ? trace_hardirqs_on+0x10/0x10 [ 3387.058864] [] ? trace_hardirqs_on+0x10/0x10 [ 3387.058873] [] ? trace_hardirqs_on+0x10/0x10 [ 3387.058880] [] __vfs_write+0x115/0x580 [ 3387.058889] [] ? sel_read_bool+0x240/0x240 [ 3387.058896] [] ? __vfs_read+0x560/0x560 [ 3387.058906] [] ? check_preemption_disabled+0x3b/0x200 [ 3387.058915] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3387.058923] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3387.058932] [] ? __sb_start_write+0x161/0x300 [ 3387.058939] [] vfs_write+0x187/0x520 [ 3387.058949] [] SyS_write+0xd9/0x1c0 [ 3387.058959] [] ? SyS_read+0x1c0/0x1c0 [ 3387.058972] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3387.058981] [] ? SyS_read+0x1c0/0x1c0 [ 3387.058992] [] do_fast_syscall_32+0x2f1/0xa10 [ 3387.059006] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3387.059017] [] entry_SYSENTER_compat+0x90/0xa2 [ 3387.059043] Mem-Info: [ 3387.059067] active_anon:599312 inactive_anon:187543 isolated_anon:0 [ 3387.059067] active_file:5245 inactive_file:45366 isolated_file:0 [ 3387.059067] unevictable:0 dirty:71 writeback:0 unstable:0 [ 3387.059067] slab_reclaimable:8171 slab_unreclaimable:79568 [ 3387.059067] mapped:107462 shmem:208157 pagetables:35067 bounce:0 [ 3387.059067] free:610910 free_pcp:639 free_cma:0 [ 3387.059086] Node 0 active_anon:2397248kB inactive_anon:750172kB active_file:20980kB inactive_file:181464kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429848kB dirty:284kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3387.059113] DMA32 free:2434496kB min:4696kB low:7712kB high:10728kB active_anon:312180kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:20kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3676kB slab_unreclaimable:140696kB kernel_stack:5504kB pagetables:8788kB bounce:0kB free_pcp:1140kB local_pcp:652kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3387.059147] Normal free:9144kB min:5580kB low:9168kB high:12756kB active_anon:2085168kB inactive_anon:657368kB active_file:20732kB inactive_file:169020kB unevictable:0kB writepending:264kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:29008kB slab_unreclaimable:177576kB kernel_stack:45760kB pagetables:131480kB bounce:0kB free_pcp:1416kB local_pcp:720kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3387.059225] DMA32: 930*4kB (UME) 520*8kB (UME) 585*16kB (UME) 102*32kB (UME) 90*64kB (UME) 190*128kB (UME) 182*256kB (UME) 75*512kB (UME) 51*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434456kB Normal: 2298*4kB (U) 0*8kB 0*16kB 3*32kB (U) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9288kB 258767 total pagecache pages [ 3387.059273] 0 pages in swap cache [ 3387.059278] Swap cache stats: add 0, delete 0, find 0/0 [ 3387.059280] Free swap = 0kB [ 3387.059283] Total swap = 0kB [ 3387.059286] 1965979 pages RAM [ 3387.059288] 0 pages HighMem/MovableOnly [ 3387.059292] 313617 pages reserved [ 3388.020333] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3388.020342] CPU: 1 PID: 19487 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3388.020356] ffff8800b1b47890 ffffffff81b42e79 1ffff10016368f14 ffff8800b469df00 [ 3388.020367] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800b1b479d8 [ 3388.020378] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3388.020380] Call Trace: [ 3388.020394] [] dump_stack+0xc1/0x128 [ 3388.020404] [] warn_alloc.cold.31+0x7f/0x9c [ 3388.020414] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3388.020424] [] ? rcu_read_unlock_special+0x6d0/0xb20 [ 3388.020434] [] ? avc_has_perm+0x9e/0x3a0 [ 3388.020443] [] __vmalloc_node_range+0x35e/0x600 [ 3388.020451] [] ? task_has_security+0x130/0x270 [ 3388.020473] [] vmalloc+0x5b/0x70 [ 3388.020503] [] ? sel_write_load+0x135/0xfa0 [ 3388.020513] [] sel_write_load+0x135/0xfa0 [ 3388.020522] [] ? sel_read_bool+0x240/0x240 [ 3388.020531] [] ? trace_hardirqs_on+0x10/0x10 [ 3388.020539] [] ? trace_hardirqs_on+0x10/0x10 [ 3388.020548] [] ? trace_hardirqs_on+0x10/0x10 [ 3388.020556] [] __vfs_write+0x115/0x580 [ 3388.020564] [] ? sel_read_bool+0x240/0x240 [ 3388.020572] [] ? __vfs_read+0x560/0x560 [ 3388.020582] [] ? check_preemption_disabled+0x3b/0x200 [ 3388.020591] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3388.020599] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3388.020608] [] ? __sb_start_write+0x161/0x300 [ 3388.020630] [] vfs_write+0x187/0x520 [ 3388.020638] [] SyS_write+0xd9/0x1c0 [ 3388.020645] [] ? SyS_read+0x1c0/0x1c0 [ 3388.020682] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3388.020691] [] ? SyS_read+0x1c0/0x1c0 [ 3388.020698] [] do_fast_syscall_32+0x2f1/0xa10 [ 3388.020709] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3388.020719] [] entry_SYSENTER_compat+0x90/0xa2 [ 3388.020781] Mem-Info: [ 3388.020804] active_anon:600758 inactive_anon:187544 isolated_anon:0 [ 3388.020804] active_file:5245 inactive_file:45366 isolated_file:0 [ 3388.020804] unevictable:0 dirty:73 writeback:0 unstable:0 [ 3388.020804] slab_reclaimable:8171 slab_unreclaimable:79424 [ 3388.020804] mapped:107458 shmem:208157 pagetables:35135 bounce:0 [ 3388.020804] free:609668 free_pcp:428 free_cma:0 [ 3388.020822] Node 0 active_anon:2403032kB inactive_anon:750176kB active_file:20980kB inactive_file:181464kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429832kB dirty:292kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3388.020847] DMA32 free:2429556kB min:4696kB low:7712kB high:10728kB active_anon:317668kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:20kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3676kB slab_unreclaimable:140116kB kernel_stack:5920kB pagetables:9068kB bounce:0kB free_pcp:552kB local_pcp:140kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3388.020880] Normal free:9116kB min:5580kB low:9168kB high:12756kB active_anon:2085364kB inactive_anon:657372kB active_file:20732kB inactive_file:169020kB unevictable:0kB writepending:272kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:29008kB slab_unreclaimable:177580kB kernel_stack:45760kB pagetables:131472kB bounce:0kB free_pcp:1160kB local_pcp:444kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3388.020950] DMA32: 829*4kB (UME) 482*8kB (UME) 565*16kB (UME) 72*32kB (UME) 68*64kB (UME) 178*128kB (UME) 182*256kB (UME) 75*512kB (UME) 51*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2429524kB Normal: 2279*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9116kB 258767 total pagecache pages [ 3388.020998] 0 pages in swap cache [ 3388.021003] Swap cache stats: add 0, delete 0, find 0/0 [ 3388.021005] Free swap = 0kB [ 3388.021008] Total swap = 0kB [ 3388.021010] 1965979 pages RAM [ 3388.021013] 0 pages HighMem/MovableOnly [ 3388.021015] 313617 pages reserved [ 3388.037049] binder: 19473:19488 ioctl c018620c 0 returned -14 [ 3388.425839] binder: 19473:19495 ioctl c018620c 0 returned -14 00:28:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, 0x0) 00:28:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[], 0x0) 00:28:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000540)={@loopback, 0x2, 0x3, 0xff, 0x2, 0xfffffffffffffd84, 0x0, 0x80000000}, &(0x7f0000000580)=0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd) 00:28:20 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00'}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800), 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) syz_extract_tcp_res(&(0x7f00000004c0)={0x41424344, 0x41424344}, 0x0, 0x1f) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000500)={@val, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv4={{0x19, 0x4, 0x0, 0x0, 0xb9, 0x66, 0x3f, 0xffffffffffffff80, 0x16, 0x0, @broadcast, @dev, {[@timestamp={0x44, 0x20, 0x1, 0x0, 0x3, [{[@local], 0x4}, {[], 0x400}, {[], 0x9}, {}, {[], 0x7}, {[], 0x3}]}, @end, @lsrr={0x83, 0x1f, 0x1, [@empty, @loopback, @multicast2, @empty, @loopback, @rand_addr=0x6, @broadcast]}, @ssrr={0x89, 0xf, 0x9, [@loopback, @empty, @local]}]}}, @tcp={{0x4e24, 0x4e20, 0x41424344, r4, 0x67de, 0x0, 0x8, 0x18, 0x5, 0x0, 0xfffffffffffffff9, {[@exp_fastopen={0xfe, 0x9, 0xf989, "d0c53480ac"}]}}, {"0bd2a61ae2afbb1e2d8b012191c0b8b9a69ee09275b2fd5897d4b52b6c8ee4da7ac3968fb4575e1da000b2dd57370f1b7a9110b717"}}}}}, 0xc7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @empty, 0x6}, {0xa, 0x4e24, 0x101, @local, 0x7f}, 0x6e0, [0x5, 0x2, 0x8000, 0x80000001, 0x5, 0x8, 0x4, 0x3]}, 0x5c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620c, 0x0) 00:28:20 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)={0x9}) 00:28:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[], 0x0) [ 3389.899774] input: syz1 as /devices/virtual/input/input337 00:28:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd) [ 3389.988941] input: syz1 as /devices/virtual/input/input338 [ 3390.254454] binder: 19525:19543 ioctl c018620c 0 returned -14 00:28:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00'}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800), 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) syz_extract_tcp_res(&(0x7f00000004c0)={0x41424344, 0x41424344}, 0x0, 0x1f) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000500)={@val, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv4={{0x19, 0x4, 0x0, 0x0, 0xb9, 0x66, 0x3f, 0xffffffffffffff80, 0x16, 0x0, @broadcast, @dev, {[@timestamp={0x44, 0x20, 0x1, 0x0, 0x3, [{[@local], 0x4}, {[], 0x400}, {[], 0x9}, {}, {[], 0x7}, {[], 0x3}]}, @end, @lsrr={0x83, 0x1f, 0x1, [@empty, @loopback, @multicast2, @empty, @loopback, @rand_addr=0x6, @broadcast]}, @ssrr={0x89, 0xf, 0x9, [@loopback, @empty, @local]}]}}, @tcp={{0x4e24, 0x4e20, 0x41424344, r4, 0x67de, 0x0, 0x8, 0x18, 0x5, 0x0, 0xfffffffffffffff9, {[@exp_fastopen={0xfe, 0x9, 0xf989, "d0c53480ac"}]}}, {"0bd2a61ae2afbb1e2d8b012191c0b8b9a69ee09275b2fd5897d4b52b6c8ee4da7ac3968fb4575e1da000b2dd57370f1b7a9110b717"}}}}}, 0xc7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @empty, 0x6}, {0xa, 0x4e24, 0x101, @local, 0x7f}, 0x6e0, [0x5, 0x2, 0x8000, 0x80000001, 0x5, 0x8, 0x4, 0x3]}, 0x5c) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620c, 0x0) 00:28:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7) [ 3390.561556] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3390.644294] CPU: 1 PID: 19553 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3390.651322] ffff880000397890 ffffffff81b42e79 1ffff10000072f14 ffff8801a24a5f00 [ 3390.659400] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800003979d8 [ 3390.667477] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3390.675538] Call Trace: [ 3390.678123] [] dump_stack+0xc1/0x128 [ 3390.683481] [] warn_alloc.cold.31+0x7f/0x9c [ 3390.689449] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3390.696109] [] ? check_preemption_disabled+0x3b/0x200 [ 3390.702944] [] ? avc_has_perm+0x9e/0x3a0 [ 3390.708671] [] __vmalloc_node_range+0x35e/0x600 [ 3390.715007] [] ? task_has_security+0x130/0x270 [ 3390.721232] [] vmalloc+0x5b/0x70 [ 3390.726246] [] ? sel_write_load+0x135/0xfa0 [ 3390.732256] [] sel_write_load+0x135/0xfa0 [ 3390.738078] [] ? sel_read_bool+0x240/0x240 [ 3390.743957] [] ? trace_hardirqs_on+0x10/0x10 [ 3390.750006] [] ? trace_hardirqs_on+0x10/0x10 [ 3390.756061] [] ? trace_hardirqs_on+0x10/0x10 [ 3390.762114] [] __vfs_write+0x115/0x580 [ 3390.767646] [] ? sel_read_bool+0x240/0x240 [ 3390.773536] [] ? __vfs_read+0x560/0x560 [ 3390.779165] [] ? check_preemption_disabled+0x3b/0x200 [ 3390.786022] [] ? rcu_read_lock_sched_held+0x103/0x120 00:28:21 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000004}) flock(r1, 0x2) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) flock(r1, 0x2) flock(r1, 0x2) write(0xffffffffffffffff, &(0x7f0000000180)="9c074291267b2c40f5fe9eafc01c836d387a1dfbb64f7144f984597c7aaae854a37d20f0d58413d1d820cfa8f93dc82dc50bfae57eab79959bc19854d0f5695a12f2ac2783a298242aa95380f95f62ef759755f783935fe0c5c699496f7119905963c33719afa7df5f7d2b3e3560748050be43c872931220159b5ae11ce7387450820abab518c0da4aca51deee2af9ea2044120a6d1f0267077879b66c1aafdb2dbb2531cd34844e85ff66c80abf371645ed526a85f9f4d2ee479f306ba91292ba834e0268e31adf30f4eedb4ceebc25bf3aceb6", 0xd4) [ 3390.792853] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3390.799467] [] ? __sb_start_write+0x161/0x300 [ 3390.805609] [] vfs_write+0x187/0x520 [ 3390.810998] [] SyS_write+0xd9/0x1c0 [ 3390.816335] [] ? SyS_read+0x1c0/0x1c0 [ 3390.821794] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3390.828025] [] ? SyS_read+0x1c0/0x1c0 [ 3390.833472] [] do_fast_syscall_32+0x2f1/0xa10 00:28:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") socket$inet6(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd) 00:28:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(0xffffffffffffffff, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) [ 3390.839614] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3390.846280] [] entry_SYSENTER_compat+0x90/0xa2 [ 3391.321500] binder: 19555:19563 ioctl c018620c 0 returned -14 00:28:22 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000180)={{}, 0x0, 0x0, 'id0\x00', 'timer1\x00'}) 00:28:22 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r1 = dup(r0) write$P9_RSYMLINK(r1, &(0x7f0000000000)={0x14}, 0x14) 00:28:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000880)="df54d7ff05eccaf36caeed5bc78591cd59e68785ce20f1a41ed610ccf94df9e727a9d922de4b6ae3d5019a02334b6868e3c2e66d20dec6cdab0b8aaaa9dac183cf738a60fd865e71c271618fc52122ef913a9946813ff66605dcbf94e79038c9372ea53edbef16b992bb9d809d20966a529af4b253276d602a0cba33d5dcd5bbceab10589ec90792022709ede095d061869bf21ccdebff1ca2b21fb253e7a43144b2e08db39a3757341028bd9e84e85fd865375f3e872de4d8aa86575fa2001b74ce7c87ff8b2373217b7a1178296d9a8231968340be9006000000b33085000000") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd) 00:28:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}]}, 0x2c}}, 0x0) [ 3391.968525] audit_printk_skb: 1854 callbacks suppressed 00:28:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) 00:28:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e00000027f0000010000000004000000ffffffffffffffff671414aaacce1414aa"], 0x1) 00:28:22 executing program 1: [ 3391.968534] audit: type=1400 audit(1546475302.743:216067): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r1 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r1, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) pwrite64(r0, &(0x7f0000000640)="55ee64eb5729869b7a070f37e9ba9374ff0436eed5e16080519e8ed488980449979bdc4d8e0dc936f34afbbe2ac7ad7907079f117e9e779ffade2987e6d7ebae93fc09041abced88c074cdd2efc447678a02daffdbba39611eccfc566a1d6e6e6950bc4362b67ab42faf2ddfda90e19fe9c621626f6cfb82ef87064fae63765f678dac598066fc1bff2c0f68bcb49e0a25c37795", 0x94, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd) [ 3391.995242] audit: type=1400 audit(1546475302.763:216069): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:23 executing program 5: [ 3391.997551] audit: type=1400 audit(1546475302.773:216070): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:23 executing program 1: [ 3391.999176] audit: type=1400 audit(1546475302.773:216071): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) 00:28:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r0 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r0, 0x28, 0x1, 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x2dc) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r1, &(0x7f00000000c0)=0x202, 0xdd) [ 3392.000662] audit: type=1400 audit(1546475302.773:216072): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3392.002650] audit: type=1400 audit(1546475302.773:216073): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:23 executing program 1: 00:28:23 executing program 5: [ 3392.004095] audit: type=1400 audit(1546475302.773:216074): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3392.005743] audit: type=1400 audit(1546475302.773:216075): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3392.019473] audit: type=1400 audit(1546475302.793:216076): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3392.021295] audit: type=1400 audit(1546475302.793:216077): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3392.040904] Mem-Info: [ 3392.040926] active_anon:599300 inactive_anon:187544 isolated_anon:0 [ 3392.040926] active_file:5245 inactive_file:45384 isolated_file:0 [ 3392.040926] unevictable:0 dirty:61 writeback:0 unstable:0 [ 3392.040926] slab_reclaimable:8161 slab_unreclaimable:79527 [ 3392.040926] mapped:107470 shmem:208158 pagetables:35088 bounce:0 [ 3392.040926] free:611037 free_pcp:611 free_cma:0 [ 3392.040944] Node 0 active_anon:2397200kB inactive_anon:750176kB active_file:20980kB inactive_file:181536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429880kB dirty:244kB writeback:0kB shmem:832632kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3392.040968] DMA32 free:2434424kB min:4696kB low:7712kB high:10728kB active_anon:312296kB inactive_anon:92808kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:0kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3660kB slab_unreclaimable:140584kB kernel_stack:5568kB pagetables:9100kB bounce:0kB free_pcp:1320kB local_pcp:696kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3392.041000] Normal free:9724kB min:5580kB low:9168kB high:12756kB active_anon:2085004kB inactive_anon:657368kB active_file:20732kB inactive_file:169092kB unevictable:0kB writepending:244kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28984kB slab_unreclaimable:177524kB kernel_stack:45728kB pagetables:131252kB bounce:0kB free_pcp:1124kB local_pcp:620kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3392.041067] DMA32: 1042*4kB (UME) 546*8kB (UME) 606*16kB (UME) 91*32kB (UME) 103*64kB (UME) 200*128kB (UME) 183*256kB (UME) 71*512kB (UME) 50*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434392kB Normal: 2408*4kB (UME) 20*8kB (UM) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9792kB 258786 total pagecache pages [ 3392.041111] 0 pages in swap cache [ 3392.041116] Swap cache stats: add 0, delete 0, find 0/0 [ 3392.041118] Free swap = 0kB [ 3392.041121] Total swap = 0kB [ 3392.041123] 1965979 pages RAM [ 3392.041126] 0 pages HighMem/MovableOnly [ 3392.041128] 313617 pages reserved [ 3392.508959] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3392.508968] CPU: 0 PID: 19603 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3392.508983] ffff8800b4247890 ffffffff81b42e79 1ffff10016848f14 ffff8801d9d65f00 [ 3392.508994] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800b42479d8 [ 3392.509005] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3392.509007] Call Trace: [ 3392.509021] [] dump_stack+0xc1/0x128 [ 3392.509031] [] warn_alloc.cold.31+0x7f/0x9c [ 3392.509042] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3392.509052] [] ? check_preemption_disabled+0x3b/0x200 [ 3392.509062] [] ? avc_has_perm+0x9e/0x3a0 [ 3392.509071] [] __vmalloc_node_range+0x35e/0x600 [ 3392.509080] [] ? task_has_security+0x130/0x270 [ 3392.509087] [] vmalloc+0x5b/0x70 [ 3392.509096] [] ? sel_write_load+0x135/0xfa0 [ 3392.509104] [] sel_write_load+0x135/0xfa0 [ 3392.509113] [] ? sel_read_bool+0x240/0x240 [ 3392.509122] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.509130] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.509138] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.509146] [] __vfs_write+0x115/0x580 [ 3392.509154] [] ? sel_read_bool+0x240/0x240 [ 3392.509161] [] ? __vfs_read+0x560/0x560 [ 3392.509170] [] ? check_preemption_disabled+0x3b/0x200 [ 3392.509179] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3392.509189] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3392.509198] [] ? __sb_start_write+0x161/0x300 [ 3392.509205] [] vfs_write+0x187/0x520 [ 3392.509213] [] SyS_write+0xd9/0x1c0 [ 3392.509221] [] ? SyS_read+0x1c0/0x1c0 [ 3392.509229] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3392.509236] [] ? SyS_read+0x1c0/0x1c0 [ 3392.509244] [] do_fast_syscall_32+0x2f1/0xa10 [ 3392.509253] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3392.509263] [] entry_SYSENTER_compat+0x90/0xa2 [ 3392.509266] Mem-Info: [ 3392.509286] active_anon:599333 inactive_anon:187543 isolated_anon:0 [ 3392.509286] active_file:5245 inactive_file:45384 isolated_file:0 [ 3392.509286] unevictable:0 dirty:75 writeback:0 unstable:0 [ 3392.509286] slab_reclaimable:8161 slab_unreclaimable:79448 [ 3392.509286] mapped:107469 shmem:208157 pagetables:35088 bounce:0 [ 3392.509286] free:611128 free_pcp:596 free_cma:0 [ 3392.509308] Node 0 active_anon:2397332kB inactive_anon:750172kB active_file:20980kB inactive_file:181536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429876kB dirty:300kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3392.509353] DMA32 free:2434768kB min:4696kB low:7712kB high:10728kB active_anon:312172kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:0kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3660kB slab_unreclaimable:140300kB kernel_stack:5632kB pagetables:8920kB bounce:0kB free_pcp:1296kB local_pcp:636kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3392.509386] Normal free:9744kB min:5580kB low:9168kB high:12756kB active_anon:2085160kB inactive_anon:657368kB active_file:20732kB inactive_file:169092kB unevictable:0kB writepending:300kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28984kB slab_unreclaimable:177492kB kernel_stack:45728kB pagetables:131432kB bounce:0kB free_pcp:1088kB local_pcp:456kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3392.509450] DMA32: 1070*4kB (UME) 547*8kB (UME) 606*16kB (UME) 92*32kB (UME) 104*64kB (UME) 201*128kB (UME) 183*256kB (UME) 71*512kB (UME) 50*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434736kB Normal: 2417*4kB (UE) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9668kB 258785 total pagecache pages [ 3392.509496] 0 pages in swap cache [ 3392.509501] Swap cache stats: add 0, delete 0, find 0/0 [ 3392.509504] Free swap = 0kB [ 3392.509506] Total swap = 0kB [ 3392.509508] 1965979 pages RAM [ 3392.509511] 0 pages HighMem/MovableOnly [ 3392.509513] 313617 pages reserved [ 3392.942475] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3392.942485] CPU: 1 PID: 19611 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3392.942500] ffff8800a819f890 ffffffff81b42e79 1ffff10015033f14 ffff880130d88000 [ 3392.942511] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a819f9d8 [ 3392.942524] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3392.942526] Call Trace: [ 3392.942541] [] dump_stack+0xc1/0x128 [ 3392.942551] [] warn_alloc.cold.31+0x7f/0x9c [ 3392.942562] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3392.942573] [] ? rcu_read_unlock_special+0x6d0/0xb20 [ 3392.942583] [] ? avc_has_perm+0x9e/0x3a0 [ 3392.942592] [] __vmalloc_node_range+0x35e/0x600 [ 3392.942601] [] ? task_has_security+0x130/0x270 [ 3392.942608] [] vmalloc+0x5b/0x70 [ 3392.942616] [] ? sel_write_load+0x135/0xfa0 [ 3392.942624] [] sel_write_load+0x135/0xfa0 [ 3392.942633] [] ? sel_read_bool+0x240/0x240 [ 3392.942643] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.942652] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.942661] [] ? trace_hardirqs_on+0x10/0x10 [ 3392.942681] [] __vfs_write+0x115/0x580 [ 3392.942691] [] ? sel_read_bool+0x240/0x240 [ 3392.942699] [] ? __vfs_read+0x560/0x560 [ 3392.942716] [] ? check_preemption_disabled+0x3b/0x200 [ 3392.942726] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3392.942735] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3392.942746] [] ? __sb_start_write+0x161/0x300 [ 3392.942754] [] vfs_write+0x187/0x520 [ 3392.942762] [] SyS_write+0xd9/0x1c0 [ 3392.942770] [] ? SyS_read+0x1c0/0x1c0 [ 3392.942779] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3392.942787] [] ? SyS_read+0x1c0/0x1c0 [ 3392.942795] [] do_fast_syscall_32+0x2f1/0xa10 [ 3392.942806] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3392.942816] [] entry_SYSENTER_compat+0x90/0xa2 [ 3392.942842] Mem-Info: [ 3392.942864] active_anon:599258 inactive_anon:187543 isolated_anon:0 [ 3392.942864] active_file:5245 inactive_file:45384 isolated_file:0 [ 3392.942864] unevictable:0 dirty:75 writeback:0 unstable:0 [ 3392.942864] slab_reclaimable:8161 slab_unreclaimable:79390 [ 3392.942864] mapped:107469 shmem:208157 pagetables:35051 bounce:0 [ 3392.942864] free:611192 free_pcp:620 free_cma:0 [ 3392.942881] Node 0 active_anon:2397032kB inactive_anon:750172kB active_file:20980kB inactive_file:181536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429876kB dirty:300kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3392.942905] DMA32 free:2435024kB min:4696kB low:7712kB high:10728kB active_anon:312172kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:0kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3660kB slab_unreclaimable:140068kB kernel_stack:5568kB pagetables:8920kB bounce:0kB free_pcp:1376kB local_pcp:704kB free_cma:0kB lowmem_reserve[]: 0 3505 3505 [ 3392.942936] Normal free:9744kB min:5580kB low:9168kB high:12756kB active_anon:2085060kB inactive_anon:657368kB active_file:20732kB inactive_file:169092kB unevictable:0kB writepending:300kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28984kB slab_unreclaimable:177492kB kernel_stack:45728kB pagetables:131284kB bounce:0kB free_pcp:1104kB local_pcp:420kB free_cma:0kB lowmem_reserve[]: 0 0 0 [ 3392.943003] DMA32: 1070*4kB (UME) 547*8kB (UME) 606*16kB (UME) 100*32kB (UME) 104*64kB (UME) 201*128kB (UME) 183*256kB (UME) 71*512kB (UME) 50*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434992kB Normal: 2417*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9668kB 258785 total pagecache pages [ 3392.943045] 0 pages in swap cache [ 3392.943050] Swap cache stats: add 0, delete 0, find 0/0 [ 3392.943053] Free swap = 0kB [ 3392.943055] Total swap = 0kB [ 3392.943058] 1965979 pages RAM [ 3392.943060] 0 pages HighMem/MovableOnly [ 3392.943063] 313617 pages reserved 00:28:25 executing program 3: 00:28:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0) 00:28:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x5, 0x0, 0xfffffffffffffff0) 00:28:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r0 = creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') fallocate(r0, 0x28, 0x1, 0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r1, &(0x7f00000000c0)=0x202, 0xdd) 00:28:25 executing program 1: 00:28:25 executing program 5: 00:28:25 executing program 1: 00:28:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x5, 0x0, 0x0) 00:28:25 executing program 5: [ 3394.564380] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x24000c2(GFP_KERNEL|__GFP_HIGHMEM) [ 3394.593602] CPU: 1 PID: 19642 Comm: syz-executor4 Not tainted 4.9.141+ #23 [ 3394.600608] ffff8800a1f9f890 ffffffff81b42e79 1ffff100143f3f14 ffff880096810000 [ 3394.608689] ffffffff82aa8c00 0000000000000001 0000000000400000 ffff8800a1f9f9d8 [ 3394.616757] ffffffff814fc7c8 0000000041b58ab3 ffffffff82e37a10 ffffffff81427db0 [ 3394.624818] Call Trace: [ 3394.627405] [] dump_stack+0xc1/0x128 [ 3394.632768] [] warn_alloc.cold.31+0x7f/0x9c [ 3394.638735] [] ? zone_watermark_ok_safe+0x250/0x250 [ 3394.645399] [] ? check_preemption_disabled+0x3b/0x200 [ 3394.652241] [] ? avc_has_perm+0x9e/0x3a0 [ 3394.657949] [] __vmalloc_node_range+0x35e/0x600 [ 3394.664266] [] ? task_has_security+0x130/0x270 [ 3394.670490] [] vmalloc+0x5b/0x70 [ 3394.675500] [] ? sel_write_load+0x135/0xfa0 [ 3394.681462] [] sel_write_load+0x135/0xfa0 [ 3394.687257] [] ? sel_read_bool+0x240/0x240 [ 3394.693144] [] ? trace_hardirqs_on+0x10/0x10 [ 3394.699216] [] ? trace_hardirqs_on+0x10/0x10 [ 3394.705295] [] ? trace_hardirqs_on+0x10/0x10 [ 3394.711347] [] __vfs_write+0x115/0x580 [ 3394.716880] [] ? sel_read_bool+0x240/0x240 [ 3394.722759] [] ? __vfs_read+0x560/0x560 [ 3394.728384] [] ? check_preemption_disabled+0x3b/0x200 [ 3394.735259] [] ? rcu_read_lock_sched_held+0x103/0x120 [ 3394.742106] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 3394.748687] [] ? __sb_start_write+0x161/0x300 [ 3394.754829] [] vfs_write+0x187/0x520 [ 3394.760195] [] SyS_write+0xd9/0x1c0 [ 3394.765466] [] ? SyS_read+0x1c0/0x1c0 [ 3394.770915] [] ? do_fast_syscall_32+0xcf/0xa10 [ 3394.777147] [] ? SyS_read+0x1c0/0x1c0 00:28:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) rmdir(&(0x7f0000000000)='./bus\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) [ 3394.782611] [] do_fast_syscall_32+0x2f1/0xa10 [ 3394.788752] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3394.795420] [] entry_SYSENTER_compat+0x90/0xa2 00:28:25 executing program 3: 00:28:25 executing program 1: 00:28:25 executing program 5: [ 3395.383870] Mem-Info: [ 3395.407550] active_anon:599321 inactive_anon:187543 isolated_anon:0 [ 3395.407550] active_file:5245 inactive_file:45399 isolated_file:0 [ 3395.407550] unevictable:0 dirty:90 writeback:0 unstable:0 [ 3395.407550] slab_reclaimable:8157 slab_unreclaimable:79664 [ 3395.407550] mapped:107490 shmem:208157 pagetables:35096 bounce:0 [ 3395.407550] free:610905 free_pcp:590 free_cma:0 [ 3395.566614] Node 0 active_anon:2397284kB inactive_anon:750172kB active_file:20980kB inactive_file:181596kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:429860kB dirty:360kB writeback:0kB shmem:832628kB writeback_tmp:0kB unstable:0kB pages_scanned:0 all_unreclaimable? no [ 3395.670325] DMA32 free:2434672kB min:4696kB low:7712kB high:10728kB active_anon:312096kB inactive_anon:92804kB active_file:248kB inactive_file:12444kB unevictable:0kB writepending:0kB present:3145324kB managed:3020132kB mlocked:0kB slab_reclaimable:3644kB slab_unreclaimable:140780kB kernel_stack:5504kB pagetables:8920kB bounce:0kB free_pcp:1320kB local_pcp:620kB free_cma:0kB [ 3395.747904] lowmem_reserve[]: 0 3505 3505 [ 3395.752682] Normal free:9444kB min:5580kB low:9168kB high:12756kB active_anon:2085088kB inactive_anon:657368kB active_file:20732kB inactive_file:169152kB unevictable:0kB writepending:360kB present:4718592kB managed:3589316kB mlocked:0kB slab_reclaimable:28984kB slab_unreclaimable:177776kB kernel_stack:45760kB pagetables:131316kB bounce:0kB free_pcp:868kB local_pcp:200kB free_cma:0kB [ 3395.788712] lowmem_reserve[]: 0 0 0 [ 3395.792986] DMA32: 1096*4kB (UME) 566*8kB (UME) 605*16kB (UME) 106*32kB (UME) 90*64kB (UME) 202*128kB (UME) 183*256kB (UME) 71*512kB (UME) 50*1024kB (UME) 33*2048kB (UME) 532*4096kB (UM) = 2434656kB [ 3395.816579] Normal: 2396*4kB (UM) 2*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 9600kB 258800 total pagecache pages [ 3395.834880] 0 pages in swap cache [ 3395.840553] Swap cache stats: add 0, delete 0, find 0/0 [ 3395.845925] Free swap = 0kB 00:28:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9"], 0x4) 00:28:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x5, 0x0, 0x0) 00:28:26 executing program 5: 00:28:26 executing program 3: 00:28:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000240)='./bus\x00', 0x200000000020004) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:26 executing program 1: [ 3395.850981] Total swap = 0kB [ 3395.854004] 1965979 pages RAM [ 3395.858918] 0 pages HighMem/MovableOnly [ 3395.862894] 313617 pages reserved 00:28:26 executing program 5: 00:28:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000180)) 00:28:26 executing program 3: 00:28:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x5, 0x0, 0x0) 00:28:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) rmdir(&(0x7f0000000200)='./bus\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9"], 0x4) 00:28:27 executing program 3: 00:28:27 executing program 5: 00:28:27 executing program 1: 00:28:27 executing program 3: 00:28:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9"], 0x4) 00:28:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xfffffffffffffff0) 00:28:27 executing program 5: 00:28:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:27 executing program 1: [ 3396.977502] audit_printk_skb: 2955 callbacks suppressed [ 3396.977511] audit: type=1400 audit(1546475307.753:217063): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:27 executing program 3: [ 3396.978400] audit: type=1400 audit(1546475307.753:217064): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:27 executing program 5: 00:28:27 executing program 1: 00:28:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) [ 3396.980352] audit: type=1400 audit(1546475307.753:217065): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.982281] audit: type=1400 audit(1546475307.753:217066): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:28 executing program 3: [ 3396.984281] audit: type=1400 audit(1546475307.753:217067): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:28 executing program 1: 00:28:28 executing program 5: [ 3396.986281] audit: type=1400 audit(1546475307.753:217068): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.987149] audit: type=1400 audit(1546475307.753:217069): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.989070] audit: type=1400 audit(1546475307.753:217070): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.991013] audit: type=1400 audit(1546475307.753:217071): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3396.992926] audit: type=1400 audit(1546475307.753:217072): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf90800"], 0x6) 00:28:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:28 executing program 2: 00:28:28 executing program 3: 00:28:28 executing program 1: 00:28:28 executing program 5: 00:28:29 executing program 3: 00:28:29 executing program 0: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:29 executing program 1: 00:28:29 executing program 5: 00:28:29 executing program 2: 00:28:29 executing program 1: 00:28:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf90800"], 0x6) 00:28:29 executing program 2: 00:28:29 executing program 3: 00:28:29 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 00:28:29 executing program 0: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:29 executing program 1: getrlimit(0x20000004, 0x0) 00:28:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) sendfile(r1, r2, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) 00:28:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50}, 0x50) 00:28:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf90800"], 0x6) 00:28:29 executing program 5: 00:28:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:30 executing program 1: 00:28:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000009c0)=ANY=[@ANYBLOB="fe8000000000000000000000000000aa000000006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000025bd7000000000000000000000000000000000000000000000000000"], 0x1}, 0x8}, 0x0) 00:28:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9080000"], 0x7) 00:28:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x3}) 00:28:30 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) 00:28:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) r1 = getpgid(0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/igmp\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp6\x00') sendfile(r0, r2, 0x0, 0xffffffff) add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 00:28:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrandom(&(0x7f0000003800)=""/4096, 0xfffffffffffffcdd, 0x2) 00:28:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9080000"], 0x7) 00:28:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000000340)='u', 0x1, 0x0, 0x0, 0x0) 00:28:31 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) 00:28:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x202, 0xdd) 00:28:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9080000"], 0x7) 00:28:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x9, 0x3ff, 0x21}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0}, 0x20) [ 3400.722055] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3400.743378] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3400.777529] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3400.811792] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0)=0x202, 0xdd) [ 3400.852660] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3400.892187] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3400.934531] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:31 executing program 2: r0 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x4bd) [ 3400.985095] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.024048] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.055963] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.090252] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 3401.144916] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.175801] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r1}, 0xff08) [ 3401.212280] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.249619] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, 0x0) [ 3401.292912] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.327377] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) [ 3401.374085] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.413039] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 3401.448390] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 00:28:32 executing program 2: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x17\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 3401.492852] hid-generic 0000:0000:0000.0036: hidraw0: HID v0.00 Device [syz0] on syz0 00:28:32 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x04\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 3401.538258] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538271] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538284] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538296] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538307] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538320] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538332] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538344] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538356] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538368] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538380] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538392] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538404] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538417] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538429] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538441] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538453] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538465] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538477] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.538489] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 3401.546851] hid-generic 0000:0000:0000.0037: hidraw1: HID v0.00 Device [syz0] on syz0 [ 3401.989332] audit_printk_skb: 3651 callbacks suppressed [ 3401.989342] audit: type=1400 audit(1546475312.763:218292): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.007879] audit: type=1400 audit(1546475312.783:218293): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.013314] audit: type=1400 audit(1546475312.783:218294): avc: denied { sys_admin } for pid=31473 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.020113] audit: type=1400 audit(1546475312.793:218295): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.021947] audit: type=1400 audit(1546475312.793:218296): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.043866] audit: type=1400 audit(1546475312.813:218297): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.045874] audit: type=1400 audit(1546475312.813:218298): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.048964] audit: type=1400 audit(1546475312.823:218299): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.051011] audit: type=1400 audit(1546475312.823:218300): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3402.053216] audit: type=1400 audit(1546475312.823:218301): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/\x00\x00z0\x00\x906\xa3\x95A\x1c\xf5\xee\x8aj\xdf\n\xcb\xf0\xce\xd9,Fj\xbd\xad\x89!\xf9\x00\x9f\x80\xd5\x01)c)\xaa\xba\x92\xe1\xd6\xa6\x0fTA\x16jwl\x1a\x92%\x00\x1dY\xed\x87b_\xc4\x97r\xf68u\xf4~g\x1b\xf3g\x0eI7F\xce\x93\xef\xe1\x91\x81\xe3\xc7*\xdb\x84\x82$\xaa\x8f\xd6 \x98\x81\f\xf4R\x99\xb2\x87#E\xcc\x00\x00\x00\x00s\xed\xff\xc7\xed>Zy\x92\t\xcd\xc8\fN4\x1fn\x99\xd3P!\xb2gR\xdb\xd1\x95`\xadf\xdb($B\x95\xd1\xef\x15\x9ek\b\xc7\x17u<\xcb\xec\xde\x92 \xf1\x01X!y\x8e\f\x1eo\x84o\x12\x1b\x17\xb3\xd7%Mw\xb9[\v\x19B\n\x04\x00\x00\x00n\x86tt\xeb\xb7\xf9r\x82\x16\xac\x12\xc9\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf1\x00\xf5\xf7CT|\xcf\x88\x9c\xe7\xa7\xad\x13Y\xc7\xe7\xc8\xed\xae\xea\x1b\xb4P\x98q\xcc\xeb\xbdw\x9c\xac\xfe`\xe8\xfa\xf6\xdcm\xe5\xc4\xcc\xfa6\xc5\x91\xee\xeaT\x8b\xb8&\x88\xc9w\xab\x9a\xb6\xf3b\x8e\xc4$\x98\x06\xa5\xbb\xa8u\x96\xea@\x83\xc0\xa7\xe2J\x86\xa5\x1a\xcb\xa8\x0e=d\x9d\x10iWO&+Ivu\x8a\xff\xe7s\xf5 \xd7\x0e\x1b\xd0\x13\xa1m\xf8\xf7|\xc7\xd7\xa7\xb3CGI\x00\x1e\xf9>\xecR}\xf8\x82\xdbg\x97\x98\xf7\xe2l\x1d\xc7\xa0uv\xc8\x9c\xd5\x90\x01\xe3-\xfdn\xe8\xcd\xbc\v\xd2\xfd\xf2aj\x9dS\x1e\xc21\tz;\x82_3\x1e\v\x04_\xdf\xa3Y\xbe\xb6\x8d\t\xa5\xe7\x1c~\v\xbe\x80\xd6\x1f/h.\x8d\xd2\x17^\x00\x00\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) read(r2, 0x0, 0x7a) 00:28:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) 00:28:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r1}, 0xff08) 00:28:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0x9, 0x12) [ 3402.781259] device lo entered promiscuous mode 00:28:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, 0xffffffffffffffff, &(0x7f00000000c0)=0x202, 0xdd) 00:28:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 3403.118939] device lo entered promiscuous mode [ 3403.129313] qtaguid: iface_stat: create(lo): no inet dev [ 3403.134777] IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready 00:28:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="421e9114516d4a838fc3059266fa170e288efe205f36906f37f08a2db6", 0x1d) 00:28:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, 0x0, 0xdd) 00:28:34 executing program 2: 00:28:34 executing program 4: 00:28:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r1}, 0xff08) 00:28:34 executing program 3: 00:28:34 executing program 1: 00:28:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, 0x0, 0xdd) 00:28:34 executing program 4: 00:28:34 executing program 2: 00:28:34 executing program 3: 00:28:34 executing program 1: 00:28:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r1}, 0xff08) 00:28:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, 0x0, 0xdd) 00:28:35 executing program 4: 00:28:35 executing program 3: 00:28:35 executing program 2: 00:28:35 executing program 1: 00:28:35 executing program 4: 00:28:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000480)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:35 executing program 2: 00:28:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0), 0xdd) 00:28:35 executing program 3: 00:28:35 executing program 1: 00:28:35 executing program 4: 00:28:35 executing program 2: 00:28:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:35 executing program 3: 00:28:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0), 0xdd) 00:28:36 executing program 1: 00:28:36 executing program 4: 00:28:36 executing program 2: 00:28:36 executing program 3: 00:28:36 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:36 executing program 1: 00:28:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0), 0xdd) 00:28:36 executing program 4: 00:28:36 executing program 3: 00:28:36 executing program 2: 00:28:36 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:36 executing program 1: 00:28:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0x0) 00:28:36 executing program 4: 00:28:37 executing program 3: 00:28:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80ffffff}}}, 0xb8}}, 0x0) 00:28:37 executing program 5: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x430}}}, 0xb8}}, 0x0) 00:28:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0x0) 00:28:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x9, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000040)='v=', 0x0}, 0x20) 00:28:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000000e80)="d7", 0x1, 0x0, 0x0, 0x0) 00:28:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0xffdb, &(0x7f0000000080)={@link_local, @empty, [{}], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "911aab5cc21f21b9"}}}}, 0x0) 00:28:37 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0xd, 0x0, &(0x7f00000001c0)) 00:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3, 0x8}, 0x20) 00:28:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0x0) [ 3406.997808] audit_printk_skb: 3853 callbacks suppressed [ 3406.997818] audit: type=1400 audit(1546475317.763:219588): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3407.006159] audit: type=1400 audit(1546475317.773:219589): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:37 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) [ 3407.008953] audit: type=1400 audit(1546475317.783:219590): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3407.010984] audit: type=1400 audit(1546475317.783:219591): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 4: socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r0, r1, 0x0, 0x100000001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup(0xffffffffffffffff) [ 3407.012493] audit: type=1400 audit(1546475317.783:219592): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote}, 0xff08) 00:28:38 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f00000000c0), 0x1c) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="2e356adc9048c270891c805404cbcf8f", 0x10}], 0x1}, 0x0) [ 3407.014069] audit: type=1400 audit(1546475317.783:219593): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x4000, 0x0) [ 3407.016109] audit: type=1400 audit(1546475317.783:219594): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3407.017998] audit: type=1400 audit(1546475317.793:219595): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0xffdb, &(0x7f0000000080)={@link_local, @empty, [{}], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "911aab5cc21f21b9"}}}}, 0x0) 00:28:38 executing program 0: socket$inet(0x2, 0x0, 0x19) connect$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r0, r1, 0x0, 0x100000001) keyctl$join(0x1, &(0x7f00000001c0)={'syz'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) [ 3407.018070] audit: type=1400 audit(1546475317.793:219596): avc: denied { sys_admin } for pid=2077 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000001c0)={@remote}, 0xff08) [ 3407.019546] audit: type=1400 audit(1546475317.793:219597): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:38 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5, 0x1000000000}}, 0xe8) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000280)) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 00:28:39 executing program 3: nanosleep(&(0x7f0000000080), 0x0) 00:28:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) r3 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) 00:28:40 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r0, 0x4, 0x44400) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 00:28:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 00:28:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, 0x0, 0x0) [ 3410.696923] binder: 20103:20104 ERROR: BC_REGISTER_LOOPER called without request [ 3410.756038] binder: BINDER_SET_CONTEXT_MGR already set 00:28:41 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f000000df36)="12"}) [ 3410.797558] binder: 20103:20113 ioctl 40046207 0 returned -16 00:28:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0xffdb, &(0x7f0000000080)={@link_local, @empty, [{}], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "911aab5cc21f21b9"}}}}, 0x0) [ 3410.874284] binder: 20109:20115 ERROR: BC_REGISTER_LOOPER called without request 00:28:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) [ 3410.951801] binder: BINDER_SET_CONTEXT_MGR already set 00:28:41 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 3410.997302] binder: 20109:20121 ioctl 40046207 0 returned -16 00:28:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, 0x0, 0x0) 00:28:42 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) 00:28:42 executing program 2: 00:28:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:42 executing program 5: [ 3411.654812] binder: 20134:20137 ERROR: BC_REGISTER_LOOPER called without request 00:28:42 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 3411.782282] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3411.817439] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 00:28:42 executing program 2: [ 3411.851840] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3411.890530] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 00:28:42 executing program 5: [ 3411.933421] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3411.971334] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 00:28:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 3412.003956] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 00:28:42 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) [ 3412.008332] audit_printk_skb: 2655 callbacks suppressed [ 3412.008340] audit: type=1400 audit(1546475322.783:220483): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.013982] audit: type=1400 audit(1546475322.783:220484): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:43 executing program 2: 00:28:43 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 00:28:43 executing program 5: [ 3412.024043] audit: type=1400 audit(1546475322.793:220485): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.028018] audit: type=1400 audit(1546475322.803:220486): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.029977] audit: type=1400 audit(1546475322.803:220487): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.034481] audit: type=1400 audit(1546475322.803:220488): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.042365] audit: type=1400 audit(1546475322.813:220489): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.045543] audit: type=1400 audit(1546475322.813:220490): avc: denied { net_admin } for pid=20287 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.054808] audit: type=1400 audit(1546475322.823:220491): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.058929] audit: type=1400 audit(1546475322.833:220492): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3412.378539] binder: 20148:20149 ERROR: BC_REGISTER_LOOPER called without request [ 3412.579327] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579341] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579354] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579367] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579379] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579391] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579404] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579416] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579429] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579442] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579454] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579466] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579478] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579491] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579503] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579515] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579527] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579539] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579551] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.579564] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 3412.580961] hid-generic 0000:0000:0000.0039: hidraw0: HID v0.00 Device [syz0] on syz0 [ 3413.052658] binder: BINDER_SET_CONTEXT_MGR already set [ 3413.052667] binder: 20165:20166 ioctl 40046207 0 returned -16 [ 3413.079308] binder: 20165:20166 ERROR: BC_REGISTER_LOOPER called without request [ 3413.528731] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.535405] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.545624] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.555121] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.563951] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.572856] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.581999] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.590864] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.599516] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.606223] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.615145] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.623452] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.634371] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 3413.649015] hid-generic 0000:0000:0000.0038: hidraw0: HID v0.00 Device [syz0] on syz0 00:28:44 executing program 4: 00:28:44 executing program 2: 00:28:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:44 executing program 5: 00:28:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) 00:28:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:44 executing program 5: 00:28:44 executing program 2: 00:28:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) [ 3413.928526] binder: 20176:20180 ERROR: BC_REGISTER_LOOPER called without request 00:28:44 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) 00:28:44 executing program 4: 00:28:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0xfffffffffffffd23) 00:28:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='cubic\x00', 0xb6) 00:28:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 00:28:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/raw\x00') ppoll(&(0x7f00000001c0)=[{r0}], 0x1, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) 00:28:45 executing program 2: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x18) 00:28:45 executing program 5: rt_sigaction(0x7, &(0x7f0000000080)={&(0x7f0000000000)="67f3430faeddcb0f73d40236670f7ec8400f2eaa01000000422378daae40f661000f3805a607000000c48161c2c83a", {}, 0x0, 0x0}, &(0x7f0000000100)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000200)) 00:28:45 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:45 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) 00:28:45 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 00:28:45 executing program 2: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x200002a) 00:28:45 executing program 5: request_key(&(0x7f00000001c0)='.dead\x00', 0x0, 0x0, 0xfffffffffffffffc) 00:28:45 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000200)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:46 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') 00:28:46 executing program 4: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000180)) 00:28:46 executing program 5: request_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0) 00:28:46 executing program 2: io_setup(0x401, &(0x7f0000000140)=0x0) io_cancel(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x0) 00:28:46 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 00:28:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read(r0, 0x0, 0x0) 00:28:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') 00:28:46 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) tkill(r0, 0x2b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x200000000000003, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:28:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrusage(0x5, 0x0) 00:28:47 executing program 3: syz_open_procfs(0x0, 0x0) 00:28:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x0, 0x20000000, 0x0, 0x0) connect(r1, &(0x7f0000006540)=@nl=@unspec, 0x80) 00:28:47 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000080)="421e9114516d4a838fc3059266fa170e288efe205f36906f37f08a2db6", 0x1d) 00:28:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000000)=""/11, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) creat(0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)={0x10000010}) r4 = syz_open_pts(r0, 0x0) dup2(r3, r4) 00:28:47 executing program 3: 00:28:47 executing program 4: 00:28:47 executing program 2: [ 3417.017737] audit_printk_skb: 3426 callbacks suppressed 00:28:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) [ 3417.017746] audit: type=1400 audit(1546475327.793:221636): avc: denied { net_admin } for pid=20397 comm="syz-executor5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:47 executing program 3: [ 3417.019574] audit: type=1400 audit(1546475327.793:221637): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:48 executing program 4: 00:28:48 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) getitimer(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x80003) [ 3417.028372] audit: type=1400 audit(1546475327.803:221638): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3417.034743] audit: type=1400 audit(1546475327.803:221639): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:48 executing program 3: [ 3417.038951] audit: type=1400 audit(1546475327.813:221640): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:48 executing program 4: [ 3417.040987] audit: type=1400 audit(1546475327.813:221641): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3417.043010] audit: type=1400 audit(1546475327.813:221642): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3417.045101] audit: type=1400 audit(1546475327.813:221643): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3417.048478] audit: type=1400 audit(1546475327.823:221644): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3417.056796] audit: type=1400 audit(1546475327.823:221645): avc: denied { sys_admin } for pid=2075 comm="syz-executor1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:49 executing program 5: 00:28:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:49 executing program 2: 00:28:49 executing program 3: 00:28:49 executing program 4: 00:28:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:50 executing program 2: 00:28:50 executing program 4: 00:28:50 executing program 3: 00:28:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:50 executing program 5: 00:28:50 executing program 3: 00:28:50 executing program 2: 00:28:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:50 executing program 4: 00:28:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:50 executing program 5: 00:28:50 executing program 2: 00:28:50 executing program 3: 00:28:50 executing program 4: 00:28:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:50 executing program 5: 00:28:51 executing program 2: 00:28:51 executing program 3: 00:28:51 executing program 4: 00:28:51 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:51 executing program 5: 00:28:51 executing program 2: 00:28:51 executing program 3: 00:28:51 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'irlan0\x00', 0x3900}) write$P9_RREAD(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 00:28:51 executing program 5: r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') sendfile(r0, r1, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$join(0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) 00:28:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:51 executing program 2: mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000200)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x1, 0xffffffffffffffff) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) r4 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r2, r3, 0x0, 0x2000006) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 00:28:51 executing program 3: open(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r2, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r2, 0x0, 0x80003) 00:28:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x40000000) r2 = openat(r1, &(0x7f0000000400)='./file0\x00', 0x0, 0x4) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x0, 0x7, 0x8, 0x9, 0xc1f, 0x8}, 0x1d4) socket$inet(0x2, 0x2, 0x0) 00:28:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x2) sendfile(r1, r2, 0x0, 0x2000006) 00:28:52 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000140)}) 00:28:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r1, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005200), 0x0, 0x0, &(0x7f0000005440)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r3) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000b80)=[{{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) r5 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r5, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) 00:28:52 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:52 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='mounts\x00') [ 3422.030721] audit_printk_skb: 3426 callbacks suppressed [ 3422.030735] audit: type=1400 audit(1546475332.803:222789): avc: denied { net_raw } for pid=20393 comm="syz-executor4" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.049711] audit: type=1400 audit(1546475332.823:222790): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:53 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f000000df36)="12"}) 00:28:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 3422.051573] audit: type=1400 audit(1546475332.823:222791): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:53 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') ioctl$ASHMEM_GET_NAME(r2, 0x81007702, 0x0) sendfile(r1, r2, 0x0, 0x100000001) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 3422.053737] audit: type=1400 audit(1546475332.823:222792): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.055669] audit: type=1400 audit(1546475332.823:222793): avc: denied { net_admin } for pid=2075 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.062907] audit: type=1400 audit(1546475332.833:222794): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.064914] audit: type=1400 audit(1546475332.833:222795): avc: denied { net_admin } for pid=31473 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.074062] audit: type=1400 audit(1546475332.843:222797): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.076000] audit: type=1400 audit(1546475332.843:222798): avc: denied { net_admin } for pid=20395 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3422.077708] audit: type=1400 audit(1546475332.853:222799): avc: denied { sys_admin } for pid=20397 comm="syz-executor5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000001800)=""/4096, 0x1000, 0x2) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca0403b3c6da327afe21720024881def9fa15ec15bb0cb39374f19d63b357936a748e0bb2099ec2a79035bec4a89224cf37c93b534a5348ee94ba3f5f55fa92acaf8e0061598d802fcdc1f7253969a3278154696f42eaf07c89aacdfb016fcb0485a72fc2cdfd7d72f132ff82028a47b61d4dd4d1201d87bd883f74ac1710e05a8fe598dbd94c78adc2ad0e9ae6cb911691b61feaf07539d17c2b05a608dc1f71011c10c92f7faae952e304f0b6c94f754b11e416c4df32f5ca6c0caa6070ee04bfd47adf2f90843fc143b52d2ff50e63ea46a2677baf1df09e67c0768ee6382a8de5dc91eb5552dbd3ba7647b47efc8dc6c9de913710ad2314e3e94a2f9193c5fc3120474261c4914925707530c3a41ec98741aa30fabd70fc38cc57c6707bead0cf24b369f8989b366507b6a261842c727efa97032314f09626954d357374b42fee36fafd448fd0836bea7397b2ac03dff44372e987316fdacf8477befe768dc1505eb58bdb052a5eb3ab1a79014008c8ab55b3ea432beba4434f5199fc6f3b08934cc3fb4cc62b7a733826030153750fa61bbf0dbc1cdfef66ef77aa047c04b9ceb80ff0b99959fdeeaec0e3838dced78e9f12f997bcd992ef36baff4de252999d00406a379272912bab80fbecbd334eb4b844c66c0018312dc20ccb52f36dc84ba4c3876fe9f5b49f39e49e9348f38bcfb4a77a36790971c41c0ed554ebf03c145336e77bca86fcce945c43075d583233b2c36ff471d140ff8b4d91b33ad13540f5f2cffe0ced42839848a13cbc66f1d7393f01a8fe63b37619665d1c98bc1ae09fa9dcc642f2047a555bc8aab2ebfc00b13b902494b139ebe4b96026bf5c441b30b11611371386fac1ccf99df87093bd6609b24f7e7a1bfc175e720c7bb496c45d6f42acfacc216307f7f3bebb96f443e68717442b6ae5a9c29e10a5be02f30007653c9debdaa1e69c28d15d3bfd69232dfafae13622f4cbe9a030ae880375f7415d10770aae1c8271393546f40fa07e6e205de1f52ab215d7c2a1dc474d28e79081913f19c2c53fc8b8d86c699523e836a548c1315610ca4542b0ae145a1fac88d417252fdbec86b4d2d824ca2702102b18062a7194e2f96904dd210c1d2cbd12d253f4243324f61cbb42a0271527d7b871a1ddee9b55030a173ed9573a5cce7924946474c21e39bdddd559aa5f85e981d6ca79e967d5edb484ed6c70bf1d1c57f3ad64b5ede6ba51158d044578d395c561abd382335c5342883d6588d94fb860c0025adab4df23b2c9c00638fe33816b609267ad80e2b6b04d6b7872db753b3ed3dba724bec6c02d5a40cca99e074682f0fc6e0db69a265e5b2757dafd5db7d8a9d5f00b94e6afe662b180b750bedbbb3ba03c52bee15be40b259471fca2fd32696d241d6f9dea3beac4054146e334969e4dae0ef929a4b762bd44612353dbe8275ed21b3f34bf9b38d64e7cfbd8aebf826bd40eb2cb2331b410ca7753c40250954fa8ad12c09e7a54e18a645ad1e501d93e540c6560e702e80e360def60ccab4fd18bc3a33a9ef798aa77ccd30a0175e35b1d6df6963a489322b149d673d920695294f0e6267a4a078c4ab4b2e2cfefb7e81f45f6dd7207e2c8b7e57ac9d988856fa8c0c4c6e49be3c4f9dc7aa078f76268f0be9e2af88a0fe658b243ded33b3836d559a1fb480278f82e546eec2666def860686e9abb898d80f018edb937f7a902238194a16be357e91fd86eaab3c19ae9446a27810dfe586f2d354e251c4afdd89af87421f943d7b9e12b6640897459bd988ef31960784c8072184456fa99d33c3978a0dfc5dd88bfe941da4681d6e31894f5100b2e6fdbd75e51f2f32a0bc00976721b453c5c670b04ca27c23232be7734c35f2898512c3138c78d42626693084826d195299fdb4467db31c79761e40112d1e47d8fe1b846bec1dc7f92d59d088af95a7d4b0d10b7ece85bf6aef12693c429e3df8f7f27289857e16005a233ac1c526afcfa2d4a82ffdd0d52724b3a635e4415d7c0fbcacd1c24294919ad8bd6edc2dcc7e8c66f5980b8483d50a9f5b2204d2f9fbfccffd578dd718b342a1443be5e4f18fbc10691c678ec837ea9a37c8456dde7e3f420bd61e918270b83c3f5c3f9495b33c7be6ea81b78df808cdd55862beb2ad246bf402cbc90918f6d4ff0d24755c346cac9093a101f8ae9eb863139e012c73e10f4e09ae69f822f2bace32429dbbff181115c9eaf00deae55ac0c5c2563672947820b7d016d15049b9fe294a4613954832521727fbac1d900b441174140864c9c5d1fb58b2f0dbfbec0b62c4216a408b8b7f6c3aaaa8b3f153161173dc48daf0f2ddb3f30ac6e573430df30d6ea7259e460a19cf329c661dee097b871b351ffd22b8090df3dd9fdb22cb636f18eb4df69a63299ff3e2acf0d08a944e46907007be920a3672c215dc9fc8aa3066399d9b7494a8a2bc0416aec022389a52bb110ee99ce773132c61c04095c3d591dc273d7b91a99ec99911e7dfcc4b4522431d543ae1710ebfa4c0ac8c3b2af2827233d4b4edda49b98c7086e65b05930d2014cc44bb92217c9578282fdb9c2ce817eba860a14c8f9914353ca14f14d4baad9be49f03e91ecc42d199c3e3704d0476cbb01016326e351f6995e59287197cdc1b1a103a749b6d6a55bbc3cfdb9b8211653d55c46618fd1a0e4a2c755ab4c5d3503d4900648c6adc486ff1ea7e3228300ea161a32a55702de9115bb75928fff82d3761599792a359c3d04e738be8a16ecf1db16935bc2a6c54bd1c33f881b7f1ea687a06504667ec0f05c058392af51a4141123c6090f5ddb12845dc0a486d5f318f0efe1926b9bd5e3ae982e75f49225ee6b71899b7483b501466767a05320eebe3e94c54ec335a33eaa54ea97912a0cf844ad2edf59294af5f07ae3ffdeb7d6f03d10b7bb1616dce11ca2140ea859ddd2536602320eab4801360f821090a67562db436c0dd1209cc717bfe8fa9696ee917ca8985a0abc54b9f6f1b462e00b29b36a413e2fc784d153e95f2b7fc75b048c7aba3db76941b090e1fd76dddc8f6f2758c5e72cf101f0dc8185fb8f86fc4ec615312eb559954c2a32fb7add4699bc486c219744126c077a30f8402a03c95405f8a7981933ec1e9cf145fe8a0f0053794efacc1e8ad066841c87ff819ecf87c75e7e741faef1ade631bd2cb1572d00b341fc6306b56da50f53638e979f093fd789a28cd4cc320da4c43640a0394691f809fc0268d95e81773dfcae593f17f04864712eb47cedf4b0375399cef0982a78e1654085fb8a8704f27b1dfa5378919e4977aad38b5771c8f3402bb93a697abc7c21dd4374c4b74c1a923cdb3e532a4d2be5dd5897723f1ac3ec744b1ec87c324f93c9845456b72d7da990ec8a133864f247f5c9c88e9d3fc999b86c51d8a7d8c833dc5570b0d4339eabb0456f5b39e5216d8ee0be3465caf182d3373a50ba98b653c30b7986bed8687a005b14b344bd49cf487a96090565c35969d7e7c58af5199fe14eefe947cad9ef0fb6ab156438d5855c4bf03bb5095b72333bded3c35c5764c73abd73889d04e9904f44580726cd7491ba09840ecacac8f61e9711dcb5fd232ba71a586", 0x1000) sendfile(r0, r1, 0x0, 0x10000) syz_genetlink_get_family_id$ipvs(0x0) socket(0x10, 0x80000, 0x5) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 3423.165045] binder_alloc: binder_alloc_mmap_handler: 20414 20000000-20002000 already mapped failed -16 00:28:54 executing program 3: getrandom(&(0x7f0000001800)=""/4096, 0x1000, 0x2) 00:28:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x4000000) 00:28:54 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup2(r1, r0) 00:28:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:54 executing program 2: socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) setpriority(0x0, 0x0, 0x0) 00:28:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, 0x0, 0x4000000) 00:28:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp6\x00') 00:28:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 3423.680322] binder: BINDER_SET_CONTEXT_MGR already set [ 3423.711997] binder: 20449:20451 ioctl 40046207 0 returned -16 00:28:54 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:root_t:s0', 0x20, 'unconfined'}, 0x3c) 00:28:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0}, 0x4000000) 00:28:54 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, 0x0) 00:28:55 executing program 4: r0 = gettid() capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)) 00:28:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 00:28:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0xff) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 00:28:55 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0}, 0x4000000) 00:28:55 executing program 1: socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\f\x9a\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r1, &(0x7f0000000380), 0x41ae10cc) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 00:28:55 executing program 5: r0 = getpid() openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x28000, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000380)='IPVS\x00'}, 0x30) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x1000000005ffffd, 0x0) close(r1) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000300)) r4 = syz_open_procfs(0x0, &(0x7f00000005c0)='pagemap\x00') ioctl$TIOCSTI(r3, 0x5412, 0x0) ustat(0x7, &(0x7f00000004c0)) r5 = memfd_create(&(0x7f0000000040)='/dev/loop#\x00', 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x3ff, 0x2}}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000240), 0x2000005) 00:28:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$link(0x8, r2, r0) 00:28:56 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r1, r3, 0x0, 0x80003) 00:28:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) 00:28:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)}, 0x4000000) 00:28:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) 00:28:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000000)) 00:28:56 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x80000001, 0x2}, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00'}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) r4 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800), 0x0, r4) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) syz_extract_tcp_res(&(0x7f00000004c0)={0x41424344, 0x41424344}, 0x0, 0x1f) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000500)={@val, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv4={{0x19, 0x4, 0x0, 0x0, 0xb9, 0x66, 0x3f, 0xffffffffffffff80, 0x16, 0x0, @broadcast, @dev, {[@timestamp={0x44, 0x20, 0x1, 0x0, 0x3, [{[@local], 0x4}, {[], 0x400}, {[], 0x9}, {}, {[], 0x7}, {[], 0x3}]}, @end, @lsrr={0x83, 0x1f, 0x1, [@empty, @loopback, @multicast2, @empty, @loopback, @rand_addr=0x6, @broadcast]}, @ssrr={0x89, 0xf, 0x9, [@loopback, @empty, @local]}]}}, @tcp={{0x4e24, 0x4e20, 0x41424344, r5, 0x67de, 0x0, 0x8, 0x18, 0x5, 0x0, 0xfffffffffffffff9, {[@exp_fastopen={0xfe, 0x9, 0xf989, "d0c53480ac"}]}}, {"0bd2a61ae2afbb1e2d8b012191c0b8b9a69ee09275b2fd5897d4b52b6c8ee4da7ac3968fb4575e1da000b2dd57370f1b7a9110b717"}}}}}, 0xc7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000900)=ANY=[@ANYBLOB="00082cbd7000ffdbdf250e00000014000200080007000000000008000b000a0000004c000200080002004e0800d618c590000000000014000100fe8000000000000000000000000000aa08000b0000b0d0be9facee452800000014000100fe800000000000000000000000bb080006000800000008000400090000002000030014000600fe8000000000000000000000000000aa080000020008000800980200"], 0x1}}, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8004700d, &(0x7f00000008c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r6, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @empty, 0x6}, {0xa, 0x4e24, 0x101, @local, 0x7f}, 0x6e0, [0x5, 0x2, 0x8000, 0x80000001, 0x5, 0x8, 0x4, 0x3]}, 0x5c) 00:28:57 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000740)="eb", 0x1}], 0x1, 0x0) 00:28:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) 00:28:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002b80)=[{0xc}], 0xc}, 0x0) 00:28:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='/exe\x00\x00\x00\x00\x00\x00') io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000001c0)={0x0, 0x0, 0xf, 0x0, 0x0, r0, 0x0, 0x14, 0xffffffffe373bc50}]) 00:28:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, &(0x7f00000001c0)="a711e9c222edfafa696c1af327", 0xd) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000280)={'lo\x00', 0x2000}) fsetxattr$security_evm(r2, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="8b"], 0x1, 0x3) 00:28:57 executing program 4: pipe(0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000016) r3 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB]) ioctl$TIOCGSID(r3, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') 00:28:57 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4000010004006) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)) 00:28:57 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x80000001, 0x2}, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00'}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) r4 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800), 0x0, r4) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) syz_extract_tcp_res(&(0x7f00000004c0)={0x41424344, 0x41424344}, 0x0, 0x1f) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000500)={@val, @val={0x0, 0x0, 0x0, 0x0, 0x3}, @mpls={[], @ipv4={{0x19, 0x4, 0x0, 0x0, 0xb9, 0x66, 0x3f, 0xffffffffffffff80, 0x16, 0x0, @broadcast, @dev, {[@timestamp={0x44, 0x20, 0x1, 0x0, 0x3, [{[@local], 0x4}, {[], 0x400}, {[], 0x9}, {}, {[], 0x7}, {[], 0x3}]}, @end, @lsrr={0x83, 0x1f, 0x1, [@empty, @loopback, @multicast2, @empty, @loopback, @rand_addr=0x6, @broadcast]}, @ssrr={0x89, 0xf, 0x9, [@loopback, @empty, @local]}]}}, @tcp={{0x4e24, 0x4e20, 0x41424344, r5, 0x67de, 0x0, 0x8, 0x18, 0x5, 0x0, 0xfffffffffffffff9, {[@exp_fastopen={0xfe, 0x9, 0xf989, "d0c53480ac"}]}}, {"0bd2a61ae2afbb1e2d8b012191c0b8b9a69ee09275b2fd5897d4b52b6c8ee4da7ac3968fb4575e1da000b2dd57370f1b7a9110b717"}}}}}, 0xc7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000006c0)={&(0x7f0000000600), 0xc, &(0x7f0000000680)={&(0x7f0000000900)=ANY=[@ANYBLOB="00082cbd7000ffdbdf250e00000014000200080007000000000008000b000a0000004c000200080002004e0800d618c590000000000014000100fe8000000000000000000000000000aa08000b0000b0d0be9facee452800000014000100fe800000000000000000000000bb080006000800000008000400090000002000030014000600fe8000000000000000000000000000aa080000020008000800980200"], 0x1}}, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8004700d, &(0x7f00000008c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r6, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e20, 0x20, @empty, 0x6}, {0xa, 0x4e24, 0x101, @local, 0x7f}, 0x6e0, [0x5, 0x2, 0x8000, 0x80000001, 0x5, 0x8, 0x4, 0x3]}, 0x5c) [ 3427.038476] audit_printk_skb: 3075 callbacks suppressed [ 3427.038485] audit: type=1400 audit(1546475337.813:223826): avc: denied { sys_admin } for pid=20395 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) [ 3427.077428] audit: type=1400 audit(1546475337.783:223824): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:58 executing program 3: [ 3427.080764] audit: type=1400 audit(1546475337.853:223827): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:58 executing program 4: pipe(0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000016) r3 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB]) ioctl$TIOCGSID(r3, 0x5429, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') [ 3427.100233] audit: type=1400 audit(1546475337.873:223829): avc: denied { sys_admin } for pid=20287 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.103077] audit: type=1400 audit(1546475337.853:223828): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 00:28:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) 00:28:58 executing program 3: [ 3427.105243] audit: type=1400 audit(1546475337.873:223830): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.114709] audit: type=1400 audit(1546475337.883:223831): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.122393] audit: type=1400 audit(1546475337.893:223832): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.127711] audit: type=1400 audit(1546475337.903:223833): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.129771] audit: type=1400 audit(1546475337.903:223834): avc: denied { net_admin } for pid=2077 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 3427.718071] ================================================================== [ 3427.718086] BUG: KASAN: use-after-free in sk_dst_check+0x372/0x3a0 [ 3427.718092] Read of size 4 at addr ffff8801bf25f1c0 by task syz-executor2/20582 [ 3427.718093] [ 3427.718101] CPU: 0 PID: 20582 Comm: syz-executor2 Not tainted 4.9.141+ #23 [ 3427.718116] ffff8800b187f680 ffffffff81b42e79 ffffea0006fc97c0 ffff8801bf25f1c0 [ 3427.718126] 0000000000000000 ffff8801bf25f1c0 ffff8801bf25f1c0 ffff8800b187f6b8 [ 3427.718136] ffffffff815009b8 ffff8801bf25f1c0 0000000000000004 0000000000000000 [ 3427.718138] Call Trace: [ 3427.718151] [] dump_stack+0xc1/0x128 [ 3427.718162] [] print_address_description+0x6c/0x234 [ 3427.718171] [] kasan_report.cold.6+0x242/0x2fe [ 3427.718179] [] ? sk_dst_check+0x372/0x3a0 [ 3427.718187] [] __asan_report_load4_noabort+0x14/0x20 [ 3427.718195] [] sk_dst_check+0x372/0x3a0 [ 3427.718202] [] ? __sk_dst_check+0x240/0x240 [ 3427.718212] [] udp_sendmsg+0x107a/0x1c60 [ 3427.718220] [] ? udp_sendmsg+0xe9f/0x1c60 [ 3427.718230] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 3427.718238] [] ? udp_v4_get_port+0x100/0x100 [ 3427.718247] [] ? trace_hardirqs_on+0x10/0x10 [ 3427.718258] [] ? sock_has_perm+0x1c1/0x3e0 [ 3427.718267] [] ? sock_has_perm+0x293/0x3e0 [ 3427.718275] [] ? sock_has_perm+0x9f/0x3e0 [ 3427.718285] [] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 3427.718294] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 3427.718304] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.718312] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.718320] [] ? inet_sendmsg+0x143/0x4d0 [ 3427.718328] [] inet_sendmsg+0x203/0x4d0 [ 3427.718335] [] ? inet_sendmsg+0x73/0x4d0 [ 3427.718342] [] ? inet_recvmsg+0x4c0/0x4c0 [ 3427.718354] [] sock_sendmsg+0xbb/0x110 [ 3427.718361] [] ___sys_sendmsg+0x47a/0x840 [ 3427.718369] [] ? trace_hardirqs_on+0x10/0x10 [ 3427.718377] [] ? copy_msghdr_from_user+0x530/0x530 [ 3427.718387] [] ? futex_wait_restart+0x230/0x230 [ 3427.718396] [] ? avc_has_extended_perms+0x56a/0xd90 [ 3427.718405] [] ? avc_has_extended_perms+0xde/0xd90 [ 3427.718414] [] ? __unwind_start+0x14d/0x3b0 [ 3427.718422] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 3427.718430] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.718439] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.718448] [] ? __fget+0x214/0x3d0 [ 3427.718456] [] ? __fget+0x23b/0x3d0 [ 3427.718464] [] ? __fget+0x47/0x3d0 [ 3427.718472] [] __sys_sendmmsg+0x23c/0x3d0 [ 3427.718480] [] ? SyS_sendmsg+0x50/0x50 [ 3427.718490] [] ? kvm_clock_read+0x23/0x40 [ 3427.718498] [] ? kvm_clock_get_cycles+0x9/0x10 [ 3427.718508] [] ? ktime_get_ts64+0x24e/0x2e0 [ 3427.718516] [] ? posix_ktime_get_ts+0x15/0x20 [ 3427.718525] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 3427.718533] [] ? SyS_clock_settime+0x220/0x220 [ 3427.718544] [] ? __compat_put_timespec.isra.3+0xc7/0x140 [ 3427.718553] [] ? compat_SyS_clock_settime+0x1a0/0x1a0 [ 3427.718563] [] compat_SyS_sendmmsg+0x32/0x40 [ 3427.718571] [] ? compat_SyS_sendmsg+0x40/0x40 [ 3427.718580] [] do_fast_syscall_32+0x2f1/0xa10 [ 3427.718589] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3427.718599] [] entry_SYSENTER_compat+0x90/0xa2 [ 3427.718601] [ 3427.718605] Allocated by task 20582: [ 3427.718614] save_stack_trace+0x16/0x20 [ 3427.718621] kasan_kmalloc.part.1+0x62/0xf0 [ 3427.718626] kasan_kmalloc+0xaf/0xc0 [ 3427.718633] kasan_slab_alloc+0x12/0x20 [ 3427.718640] kmem_cache_alloc+0xd5/0x2b0 [ 3427.718648] dst_alloc+0xb5/0x1a0 [ 3427.718655] ipv4_blackhole_route+0x30/0x700 [ 3427.718663] xfrm_lookup_route+0xf5/0x140 [ 3427.718670] ip_route_output_flow+0x90/0xa0 [ 3427.718694] udp_sendmsg+0x13d9/0x1c60 [ 3427.718700] inet_sendmsg+0x203/0x4d0 [ 3427.718708] sock_sendmsg+0xbb/0x110 [ 3427.718713] ___sys_sendmsg+0x47a/0x840 [ 3427.718719] __sys_sendmmsg+0x23c/0x3d0 [ 3427.718726] compat_SyS_sendmmsg+0x32/0x40 [ 3427.718732] do_fast_syscall_32+0x2f1/0xa10 [ 3427.718739] entry_SYSENTER_compat+0x90/0xa2 [ 3427.718740] [ 3427.718743] Freed by task 4900: [ 3427.718751] save_stack_trace+0x16/0x20 [ 3427.718757] kasan_slab_free+0xac/0x190 [ 3427.718764] kmem_cache_free+0xbe/0x310 [ 3427.718770] dst_destroy+0x277/0x350 [ 3427.718777] dst_gc_task+0x1a9/0x510 [ 3427.718783] process_one_work+0x831/0x15f0 [ 3427.718789] worker_thread+0xd6/0x1140 [ 3427.718797] kthread+0x26d/0x300 [ 3427.718803] ret_from_fork+0x5c/0x70 [ 3427.718804] [ 3427.718810] The buggy address belongs to the object at ffff8801bf25f140 [ 3427.718810] which belongs to the cache ip_dst_cache of size 216 [ 3427.718817] The buggy address is located 128 bytes inside of [ 3427.718817] 216-byte region [ffff8801bf25f140, ffff8801bf25f218) [ 3427.718819] The buggy address belongs to the page: [ 3427.718827] page:ffffea0006fc97c0 count:1 mapcount:0 mapping: (null) index:0x0 [ 3427.718832] flags: 0x4000000000000080(slab) [ 3427.718835] page dumped because: kasan: bad access detected [ 3427.718836] [ 3427.718838] Memory state around the buggy address: [ 3427.718846] ffff8801bf25f080: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 3427.718852] ffff8801bf25f100: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 3427.718858] >ffff8801bf25f180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3427.718860] ^ [ 3427.718866] ffff8801bf25f200: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 3427.718872] ffff8801bf25f280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3427.718874] ================================================================== [ 3427.718876] Disabling lock debugging due to kernel taint [ 3427.718893] Kernel panic - not syncing: panic_on_warn set ... [ 3427.718893] [ 3427.718901] CPU: 0 PID: 20582 Comm: syz-executor2 Tainted: G B 4.9.141+ #23 [ 3427.718913] ffff8800b187f5e0 ffffffff81b42e79 ffffffff82e37630 00000000ffffffff [ 3427.718924] 0000000000000000 0000000000000000 ffff8801bf25f1c0 ffff8800b187f6a0 [ 3427.718934] ffffffff813f7125 0000000041b58ab3 ffffffff82e2b62b ffffffff813f6f66 [ 3427.718936] Call Trace: [ 3427.718945] [] dump_stack+0xc1/0x128 [ 3427.718954] [] panic+0x1bf/0x39f [ 3427.718962] [] ? add_taint.cold.5+0x16/0x16 [ 3427.718971] [] kasan_end_report+0x47/0x4f [ 3427.718980] [] kasan_report.cold.6+0x76/0x2fe [ 3427.718987] [] ? sk_dst_check+0x372/0x3a0 [ 3427.718996] [] __asan_report_load4_noabort+0x14/0x20 [ 3427.719003] [] sk_dst_check+0x372/0x3a0 [ 3427.719011] [] ? __sk_dst_check+0x240/0x240 [ 3427.719019] [] udp_sendmsg+0x107a/0x1c60 [ 3427.719026] [] ? udp_sendmsg+0xe9f/0x1c60 [ 3427.719035] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 3427.719043] [] ? udp_v4_get_port+0x100/0x100 [ 3427.719051] [] ? trace_hardirqs_on+0x10/0x10 [ 3427.719059] [] ? sock_has_perm+0x1c1/0x3e0 [ 3427.719068] [] ? sock_has_perm+0x293/0x3e0 [ 3427.719076] [] ? sock_has_perm+0x9f/0x3e0 [ 3427.719086] [] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 3427.719094] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 3427.719103] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.719111] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.719119] [] ? inet_sendmsg+0x143/0x4d0 [ 3427.719126] [] inet_sendmsg+0x203/0x4d0 [ 3427.719133] [] ? inet_sendmsg+0x73/0x4d0 [ 3427.719141] [] ? inet_recvmsg+0x4c0/0x4c0 [ 3427.719150] [] sock_sendmsg+0xbb/0x110 [ 3427.719157] [] ___sys_sendmsg+0x47a/0x840 [ 3427.719165] [] ? trace_hardirqs_on+0x10/0x10 [ 3427.719172] [] ? copy_msghdr_from_user+0x530/0x530 [ 3427.719181] [] ? futex_wait_restart+0x230/0x230 [ 3427.719189] [] ? avc_has_extended_perms+0x56a/0xd90 [ 3427.719198] [] ? avc_has_extended_perms+0xde/0xd90 [ 3427.719205] [] ? __unwind_start+0x14d/0x3b0 [ 3427.719212] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 3427.719220] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.719229] [] ? check_preemption_disabled+0x3b/0x200 [ 3427.719237] [] ? __fget+0x214/0x3d0 [ 3427.719245] [] ? __fget+0x23b/0x3d0 [ 3427.719252] [] ? __fget+0x47/0x3d0 [ 3427.719261] [] __sys_sendmmsg+0x23c/0x3d0 [ 3427.719268] [] ? SyS_sendmsg+0x50/0x50 [ 3427.719277] [] ? kvm_clock_read+0x23/0x40 [ 3427.719285] [] ? kvm_clock_get_cycles+0x9/0x10 [ 3427.719293] [] ? ktime_get_ts64+0x24e/0x2e0 [ 3427.719301] [] ? posix_ktime_get_ts+0x15/0x20 [ 3427.719309] [] ? SyS_clock_gettime+0x11e/0x1f0 [ 3427.719318] [] ? SyS_clock_settime+0x220/0x220 [ 3427.719327] [] ? __compat_put_timespec.isra.3+0xc7/0x140 [ 3427.719336] [] ? compat_SyS_clock_settime+0x1a0/0x1a0 [ 3427.719345] [] compat_SyS_sendmmsg+0x32/0x40 [ 3427.719353] [] ? compat_SyS_sendmsg+0x40/0x40 [ 3427.719361] [] do_fast_syscall_32+0x2f1/0xa10 [ 3427.719370] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 3427.719378] [] entry_SYSENTER_compat+0x90/0xa2 [ 3427.719698] Kernel Offset: disabled [ 3428.786494] Rebooting in 86400 seconds..