000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000400)) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 22:01:06 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key(&(0x7f0000000440)='cifs.idmap\x00', &(0x7f0000000480), &(0x7f00000004c0), 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000006c0)='cifs.spnego\x00', &(0x7f0000000700), &(0x7f0000000740)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000780), &(0x7f00000007c0)=""/195, 0xc3, &(0x7f0000000940)={&(0x7f00000008c0)={'sha256-avx\x00'}, &(0x7f0000000900)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) rt_sigpending(&(0x7f0000000080), 0x8) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e00)={{{@in6=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) getpgid(0x0) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000032c0)) 22:01:06 executing program 5: mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0xffffffffffffffff, 0x6000000}, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='ext2\x00', 0x1000000000f000, 0x0) [ 364.633884] audit: type=1400 audit(1537308066.757:550): avc: denied { write } for pid=10171 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:06 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000001c0)={0x90}, 0x90) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000040)=""/119) 22:01:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@remote, 0x0, 0x0, 0x1, 0x1}, 0x21) 22:01:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 22:01:07 executing program 5: clock_adjtime(0x0, &(0x7f00000004c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), &(0x7f0000000240), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340), &(0x7f0000000380), 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:07 executing program 0: pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:08 executing program 4: r0 = eventfd(0x0) fcntl$dupfd(r0, 0xffffffffffffffff, 0xffffffffffffffff) 22:01:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fdinfo\x00') getdents(r0, &(0x7f0000001000)=""/24, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) 22:01:08 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001780)='/dev/urandom\x00', 0x0, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000001a80)={0x1}) 22:01:08 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create1(0x0) getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000002c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) clock_getres(0x0, &(0x7f0000000180)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x4) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/118, 0x76) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000580)) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000500)) bind$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @multicast2}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@empty, @local}, &(0x7f0000000600)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@remote, @in=@broadcast}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@broadcast, @in6}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000940)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000a80)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b00)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000e00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@remote}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001080)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000011c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001200)={{{@in6=@local, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001680)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000017c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001800)={'team_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001900)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005dc0)={{{@in=@remote, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000005ec0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005f00)={{{@in=@multicast2, @in=@dev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006100)={'team_slave_1\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000006140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000061c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000062c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006300)={'bcsf0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006340)={{{@in6, @in6=@mcast2}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000006440)=0xe8) syz_execute_func(&(0x7f0000000400)="428055a0aa878769ef69dc00d9ce8441ff15db0f1860376038211ac4c9c90feefa4e2179fb237532f3440fbd6e2f1a55010d64ac1e5da358b706b7989f7f") 22:01:08 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="095e0ca80f58aaaaaaaaaabb86dd60a1d90c000000000000000000000000bbfe8000000000000000000000000000aa0420880b0000000000000800000086dd080088be00000000100000000100010000000000080022eb0000000020000000020000000009000000000000080065580000000000000000000000"], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 22:01:08 executing program 3: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000140)) read(r1, &(0x7f0000000300)=""/164, 0xa4) 22:01:08 executing program 2: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d3192b744db1ce2e2fb") 22:01:08 executing program 5: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) 22:01:09 executing program 0: r0 = memfd_create(&(0x7f0000000280)="25519fec096f7072ef6300", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x7ffffffd) 22:01:09 executing program 1: r0 = socket(0x10, 0x20000000000003, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000640)={&(0x7f0000000040), 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x14, r1, 0x401}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000180)=@pppol2tpin6, 0x80, &(0x7f0000000280)=[{&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000200)=""/98, 0x62}], 0x3, &(0x7f00000004c0)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f00000027c0)) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 22:01:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='notify_on_release\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='3'], 0x1) 22:01:09 executing program 5: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:09 executing program 0: unshare(0x20400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x200800, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) 22:01:09 executing program 4: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004400)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) lstat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005140)) stat(&(0x7f0000005180)='./file1\x00', &(0x7f00000051c0)) lstat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005440)) fstat(0xffffffffffffffff, &(0x7f0000005480)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:10 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)=@known='security.evm\x00', &(0x7f0000000100)='ppp0\x00', 0xfcd2, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.selinux\x00', &(0x7f00000002c0)='security.evm\x00', 0xd, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=@known='security.evm\x00', &(0x7f00000001c0)=""/148, 0xffffff25) [ 367.980368] audit_printk_skb: 27 callbacks suppressed [ 368.031217] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket [ 368.040030] audit: type=1400 audit(1537308070.097:560): avc: denied { create } for pid=10270 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 368.042130] audit: type=1400 audit(1537308070.157:561): avc: denied { write } for pid=10270 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:10 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x43, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0x8}}}}}, 0x0) [ 368.347921] audit: type=1400 audit(1537308070.467:562): avc: denied { read } for pid=10270 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:10 executing program 0: accept4$unix(0xffffffffffffff9c, &(0x7f0000000180)=@abs, &(0x7f0000000140)=0x6e, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 368.545211] audit: type=1400 audit(1537308070.667:563): avc: denied { create } for pid=10270 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 368.545314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket [ 368.684461] audit: type=1401 audit(1537308070.807:564): op=setxattr invalid_context="security.evm" 22:01:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/net\x00') [ 368.731504] audit: type=1401 audit(1537308070.847:565): op=setxattr invalid_context="security.evm" 22:01:10 executing program 3: mlock2(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000040)) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d09f244a4660f38302fbae5e5e57567470fe3ba02d43c28010d64ac1e5d31a3b7e29873bb7f") 22:01:10 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:01:11 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000a00), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r1, &(0x7f00000017c0)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000000)=""/6, 0x6}}], 0x1, 0x0, &(0x7f0000000140)) 22:01:11 executing program 2: unshare(0x20400) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x0, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0xa6) 22:01:12 executing program 4: unshare(0x40400) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$getflags(r0, 0x1000000040a) 22:01:12 executing program 5: prctl$void(0xf) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getrlimit(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getrlimit(0x0, &(0x7f0000000040)) 22:01:12 executing program 0: getitimer(0x0, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000040)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) syz_execute_func(&(0x7f0000000300)="42805da0be0f4201cceece73fe19fa380f38210f14d481d9b5e5bc2b380021f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271f30703") 22:01:12 executing program 1: poll(&(0x7f0000000140), 0x0, 0x0) setpriority(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x200000000001, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a06143dfc2e9d92a5c41ff0f1837370f38211ac482fd252061f907e55cfa5cfa79fb6744d9ee4175455de0932ebc2ebc0d64ac1e309f7f") 22:01:12 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) 22:01:12 executing program 2: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 370.443917] audit: type=1400 audit(1537308072.567:566): avc: denied { create } for pid=10339 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:12 executing program 4: sysinfo(&(0x7f0000000940)=""/245) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:12 executing program 0: dup(0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140)={{0x0, @remote, 0x0, 0x0, 'nq\x00'}, {@rand_addr}}, 0x44) getitimer(0x0, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:13 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180)="a4", 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) signalfd4(0xffffffffffffffff, &(0x7f0000000540), 0x8, 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000540), 0x40001ce, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) tgkill(0x0, 0x0, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0726969ef69dc00d969203737c3397c2a8fe928954484d00f38211a40a564a70f157a9e400f01efe559417545c462010d42002e1a1a3ef0f658550120eeeea3b786e298c4227992749f55") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) 22:01:13 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000300), 0x0) chmod(&(0x7f00000002c0)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da00fef69dc0f01ee263a200986bdd4c9bdd4c941cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:01:13 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) writev(r0, &(0x7f0000001280)=[{&(0x7f0000000200)="3dd2d188dbbd117aced222af2a16b5e4b951a05ee2a6f14ff1", 0x19}], 0x1) 22:01:13 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') 22:01:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 22:01:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000040), 0x4) 22:01:14 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@mcast2, @local, @local, 0x0, 0xfffffffffffffffb}) 22:01:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x1) recvmmsg(r1, &(0x7f0000000000), 0xbf, 0x10000, 0x0) 22:01:14 executing program 3: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) ioprio_get$pid(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f00000006c0)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f00000006c0)) truncate(&(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) 22:01:14 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) eventfd2(0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/223, 0xdf}], 0x1) 22:01:14 executing program 5: pselect6(0x8c, &(0x7f0000000480), &(0x7f0000000040), &(0x7f0000000500)={0x0, 0xfe}, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000080)={&(0x7f0000000180), 0x8}) 22:01:14 executing program 1: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:14 executing program 0: mlock2(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:01:15 executing program 5: chdir(&(0x7f0000000200)='./file0\x00') lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000600)) getegid() openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) socket$unix(0x1, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000300)=0x6e, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000540)='oom_adj\x00') connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000002c0), 0x0) clock_getres(0x0, &(0x7f0000000140)) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") 22:01:15 executing program 4: rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) timerfd_create(0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000000040), &(0x7f0000002380), &(0x7f00000023c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:15 executing program 1: r0 = socket(0x10000000000010, 0x3, 0x0) write(r0, &(0x7f0000f56fdc)="240000002e001f9481101a00000000002300f9ffffffffffffffffff08ffffff04010061", 0x24) 22:01:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f00000000c0)=0x805, 0xf) 22:01:16 executing program 5: getrandom(&(0x7f0000000500)=""/104, 0x9c, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000080)}}, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da053cbcbef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac5f6070364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001a00)={'veth1_to_bridge\x00'}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) 22:01:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r0, &(0x7f0000000180), 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) sendto$inet(r0, &(0x7f00000006c0)="b3", 0x1, 0x0, &(0x7f00000007c0)={0x2, 0x0, @remote}, 0x10) shutdown(r0, 0x1) 22:01:16 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000140), 0x4) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'syz_tun\x00'}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:01:16 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000018000), &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f000000a000)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x84000, &(0x7f0000000600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 22:01:16 executing program 2: r0 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x200000000114, 0x2716, &(0x7f00000000c0)=""/1, &(0x7f0000000040)=0x1) 22:01:16 executing program 3: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:17 executing program 4: mincore(&(0x7f0000ff5000/0xa000)=nil, 0xa000, &(0x7f00000001c0)=""/56) utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x77359400}}) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffc000/0x4000)=nil) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000340)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7ae98f3007f") 22:01:17 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ea, 0x0) 22:01:17 executing program 1: symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) 22:01:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 375.781482] audit: type=1400 audit(1537308077.897:567): avc: denied { create } for pid=10449 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:18 executing program 0: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff62) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0928523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460fac1b0030002e363e44d31b31a314b706e205987b7f") accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1, 0x0) 22:01:18 executing program 5: lgetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@random={'os2.', "68d903dad7726c"}, &(0x7f0000000680)=""/246, 0xf6) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) unshare(0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(r2, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x1, r3}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000b80)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 22:01:18 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) epoll_create1(0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000cc0)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b07350691913d060600770fc4c2859304963d233d23410feefa633917660f38302f65f2420ee808000000450fa01af0442975e1c44379dfb9d6adbe90dfe2989fc4a2419b75d57f") 22:01:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') getdents(r0, &(0x7f00000002c0)=""/229, 0x21) r1 = memfd_create(&(0x7f0000000380)='#vmnet1nodevem1\x00', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) getdents(r0, &(0x7f0000000040)=""/202, 0x45a40b78) 22:01:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:01:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0xfffffffefffffffd, 0x0, &(0x7f00000000c0)) 22:01:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_int(r0, 0x0, 0xe, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 22:01:19 executing program 1: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000079c0)=0x1000002c3) fstat(0xffffffffffffffff, &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003580)) 22:01:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 22:01:20 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14}, 0x14) 22:01:20 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x1000004e20, 0x0, @loopback}, 0x1c) write$cgroup_pid(r1, &(0x7f0000000100), 0xfffffcbb) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x0, './bus\x00'}, 0x6e) 22:01:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x31, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 22:01:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') getdents64(r0, &(0x7f00000003c0)=""/33, 0x21) getdents64(r0, &(0x7f0000000100)=""/213, 0xd5) 22:01:20 executing program 5: listxattr(&(0x7f0000001300)='.\x00', &(0x7f0000001380)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004400)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) statfs(&(0x7f0000003300)='./file0\x00', &(0x7f0000004d40)=""/4096) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000380)=@proc, 0xc) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000140)='&&\x00', 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) memfd_create(&(0x7f0000000080)='&&\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") 22:01:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0x39, "270302"}], 0x18}, 0x0) 22:01:20 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000880)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000240)={'raw\x00'}, &(0x7f0000000000)=0x24) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:20 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:21 executing program 1: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f00000000c0)) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000380)) fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000002c0)=""/1) request_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f00000004c0), &(0x7f0000000500)='/dev/rtc0\x00', 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000700)=0x14) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0866969ef69dc00d9c4e1fb2caca2fd368f74c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000005c0)) 22:01:21 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:21 executing program 4: syz_emit_ethernet(0x11, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@llc_tr={0x11, {@llc={0xff, 0xff, "01"}}}}}, &(0x7f00000004c0)) 22:01:21 executing program 0: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000980)='projid_map\x00') getuid() stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) mount$fuseblk(&(0x7f00000003c0)='/dev/loop0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000940)='fuseblk\x00', 0x0, &(0x7f0000000b40)=ANY=[]) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000c80)) seccomp(0x0, 0x0, &(0x7f0000000100)) geteuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) socket$unix(0x1, 0x0, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x0, &(0x7f0000000800)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}}}, &(0x7f0000000380)=0xe8) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 22:01:21 executing program 5: timer_create(0x0, &(0x7f0000000640)={0x0, 0x11, 0x0, @thr={&(0x7f0000000700), &(0x7f0000000940)}}, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") clock_gettime(0x0, &(0x7f0000000040)) nanosleep(&(0x7f0000000080), &(0x7f00000000c0)) iopl(0x0) timer_gettime(0x0, &(0x7f0000000140)) 22:01:22 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) r3 = dup2(r0, r2) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000000c0)) 22:01:22 executing program 3: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1ffffffffffffe7a}) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:01:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)={0x10}, 0x10}], 0x1, &(0x7f0000000000)}, 0x0) recvmmsg(r1, &(0x7f0000000380), 0x40000000000020a, 0x7265746c6966, &(0x7f0000002cc0)={0x0, 0x1c9c380}) 22:01:22 executing program 4: removexattr(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000400)=ANY=[]) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) epoll_create1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:22 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) keyctl$set_reqkey_keyring(0xd, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000080), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) fsync(0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:22 executing program 2: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x4000000) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:23 executing program 0: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1ffffffffffffe7a}) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:01:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, &(0x7f0000000000), &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xdfffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0xe0) 22:01:23 executing program 3: setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000040)="42805da0120fef69dc0f9f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:23 executing program 4: setpriority(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs_stats\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480), 0x83, &(0x7f0000000440)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) close(r0) 22:01:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) write$P9_RCREATE(r0, &(0x7f0000000140)={0x18}, 0x18) 22:01:24 executing program 0: setitimer(0x0, &(0x7f0000000340)={{}, {0x77359400}}, 0x0) alarm(0x0) 22:01:24 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000040)) 22:01:24 executing program 3: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000140)=0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x142, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(r0) 22:01:25 executing program 0: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x8000000000000, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") [ 383.173060] audit: type=1400 audit(1537308085.287:568): avc: denied { create } for pid=10642 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10, 0x7a00000000000000}, 0xc, &(0x7f0000023ff0)={&(0x7f00000003c0)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x3}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 22:01:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.memory_migrate\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0x20) [ 383.393732] audit: type=1400 audit(1537308085.517:569): avc: denied { create } for pid=10642 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "3fefc230d4207d4bc543a8bdf943a095209871fa74f963a8d94bf8d361c954df"}) [ 383.443318] audit: type=1400 audit(1537308085.557:570): avc: denied { write } for pid=10642 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:25 executing program 1: alarm(0x0) clock_getres(0x0, &(0x7f0000000440)) pipe2(&(0x7f0000000380), 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) lstat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f00000007c0)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000840)={0xa0}, 0xa0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:25 executing program 3: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @broadcast, @remote}, &(0x7f0000000640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @empty, @multicast1}, &(0x7f0000000cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001600)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001640)=@xdp, &(0x7f00000016c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000019c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001a40)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001e00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002580)={'ifb0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000005c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005d00)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000000500), 0xc, &(0x7f00000064c0)={&(0x7f0000005d40)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f00000005c0)="408055a03769ef69dc3641ffaa743223333333c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) 22:01:25 executing program 2: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000021002551071c0165ff00fc0202000000fd100f000ee1000c08000a0000060000", 0x24) [ 383.891331] audit: type=1400 audit(1537308086.007:571): avc: denied { create } for pid=10668 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 384.126232] audit: type=1400 audit(1537308086.247:572): avc: denied { create } for pid=10668 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:26 executing program 5: keyctl$set_reqkey_keyring(0xb, 0x654b94ce46fbec2e) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000180)=0x44) sched_yield() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fcdb8d37c41c4c287d2388008f26b14a95a8f150c355ad5e81535e556973074e546ac905ee5326267bba8aa07e9b16b43940558bfc40dda884d277ec5f6dfeae", "d8722cb7fbc9fb0792a81fe557b208c2f1b7ba21709d76ef3a78d0e6c29a2507"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:26 executing program 0: r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x7ffff000) [ 384.497269] audit: type=1400 audit(1537308086.617:573): avc: denied { create } for pid=10682 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:26 executing program 2: fsync(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000500)=""/193) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/20) syz_execute_func(&(0x7f0000000300)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") [ 384.724480] audit: type=1400 audit(1537308086.847:574): avc: denied { write } for pid=10682 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:27 executing program 1: select(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) listxattr(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)=""/93, 0x5d) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000700)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000b40)=ANY=[], 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@dev}, &(0x7f0000000800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'team0\x00'}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000a40)={@empty, @remote}) vmsplice(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) syz_execute_func(&(0x7f0000000280)="428055a09d878769ef69dc11d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb417545832e1ac4010d64ac1e5d31a3b706e2989f7f") getcwd(&(0x7f0000000ac0)=""/247, 0xf7) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) 22:01:27 executing program 2: r0 = socket$packet(0x11, 0x1000000000002, 0x300) getsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000080), &(0x7f00000041c0)=0x4) [ 385.246032] audit: type=1400 audit(1537308087.367:575): avc: denied { read } for pid=10682 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:27 executing program 0: stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc800000043c45838e5bc2b0000062121f00fbab204000000caf2430f12b8f5ffffffdae5e54175450f2e1a44dbe226f00fbb9500000000") [ 385.545278] audit: type=1400 audit(1537308087.667:576): avc: denied { create } for pid=10682 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:27 executing program 3: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) creat(&(0x7f0000000740)='./file0\x00', 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)={0x77359400}) socket$inet_udplite(0x2, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) connect(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0376969ef69dc3641ffaa32233333c4c2958e09c4c275465d4428523044c19086d962788f35c935c97d666466420ff9f279fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 22:01:28 executing program 5: getegid() ustat(0x0, &(0x7f0000000680)) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000700)={'U-', 0x3}, 0x28, 0x0) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0xffffffffffffff0b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8d000/0x8000)=nil, 0x8000, 0x1000, 0x0, &(0x7f0000d8f000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003740)={{{@in6=@mcast1, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000003840)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000038c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003bc0)=0x14) getsockname$packet(r0, &(0x7f0000003cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000003e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003fc0)={{{@in, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000040c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000041c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004340)={0x0, @multicast1, @multicast2}, &(0x7f00000004c0)=0xfffffffffffffee5) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000043c0), &(0x7f0000004400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004440)={@dev}, &(0x7f0000004480)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@mcast2}, &(0x7f0000004500)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004ec0)={0x0, @rand_addr, @multicast2}, &(0x7f0000004f00)=0xc) accept4$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f80)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004fc0)={@loopback}, &(0x7f0000005000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005880)={&(0x7f00000003c0), 0xc, &(0x7f0000005840)={&(0x7f0000005040)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000a40)=ANY=[]}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0), &(0x7f0000000600)=0x14) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:28 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000180)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000007c0)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @loopback}, 'yam0\x00'}) ftruncate(0xffffffffffffffff, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380)=""/74, &(0x7f0000000400)=0x4a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000480)) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_tables_targets\x00') syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:28 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000380)={@local, 0x0, 0x1, 0x0, 0xc}, 0x20) 22:01:28 executing program 0: socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000080)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000440)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821da5c7d049b7d049b8cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 22:01:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") lookup_dcookie(0x0, &(0x7f0000000400)=""/4096, 0x1000) 22:01:28 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) 22:01:28 executing program 1: r0 = memfd_create(&(0x7f00000001c0)="b423", 0x0) write(r0, &(0x7f0000000200)="33ef4a6061833d3f745a696d958a39ad53d6f0550701000000da10de06e0f759d4749bd469be60a516cd460e9a899cad15c6f178fc552c7690194ec771192773d1837525b87c2849b6716c100368dc2b", 0x50) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') 22:01:29 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000240), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000280)={0x9}) read(r1, &(0x7f0000000140)=""/88, 0x58) epoll_pwait(r2, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f00000000c0), 0x8) 22:01:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net\x00') fcntl$notify(r1, 0x402, 0x31) exit(0x0) getdents64(r1, &(0x7f0000000000)=""/57, 0x39) 22:01:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)='lp\x00') 22:01:29 executing program 1: request_key(&(0x7f0000000380)='logon\x00', &(0x7f0000000480), &(0x7f00000005c0)='/dev/full\x00', 0xffffffffffffffff) add_key(&(0x7f0000000600)='logon\x00', &(0x7f0000000040), &(0x7f0000000080), 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000180)=""/229, 0xe5) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:29 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000017c0)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) writev(0xffffffffffffffff, &(0x7f0000000600), 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000018c0)=""/192) finit_module(0xffffffffffffffff, &(0x7f0000001980)='selinuxnodevproc+\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000001a40), 0x0, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001840)='cgroup.type\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000001800)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:01:30 executing program 5: socketpair(0x800000002b, 0x1, 0x100000001, &(0x7f0000000080)) 22:01:30 executing program 2: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080), &(0x7f00000000c0)='-bdevwlan0\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000001c0)='\x00') syz_execute_func(&(0x7f0000000f80)="428055a03dcacaa3bcbcef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179678f38322fbae5e5e575450f2e1abe010d64ac165d31a3f5e29836e9470ff7c1e2") openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000780)) add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000680)='rxrpc\x00', &(0x7f00000006c0), &(0x7f0000000740)='veth0_to_team\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000a80), &(0x7f0000001300), 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000ac0)='encrypted\x00', &(0x7f0000000b00), &(0x7f0000000b40), 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) capget(&(0x7f00000002c0), &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340)=""/174, &(0x7f0000000280)=0xae) eventfd(0x0) syz_execute_func(&(0x7f0000000140)="428045a0410fef69dcff0f66f74377ba0037c4c37d053606c4400f12ce410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f76") 22:01:30 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000940)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2b1641824f6902c74ba203101c98854e1028387382d9ee086d2be4c923874e40d0e7b4aa7dab56e81f453202d49915a2bf2c2eadecb1417bc01f840921b92b670be53eb3738c991b84d149d5e699d65a10de001726d458b300e9abc9978491770c03d469707c666b3fb3202c804337c1efd6e219b078d62d6b0385e548c39fa2c068ba3846b56cbc76ee962c65524e007fe4b6cba91d362d707084036e2f7028b817e9f6b32007256bd39efdeebce921afa8ed1fcb70f6b2", 0xb8}], 0x1, &(0x7f00000025c0)}, 0xc100) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000a80)="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", 0x4dc}], 0x1, &(0x7f0000000280)}, 0x0) 22:01:31 executing program 5: eventfd(0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000040)={'ip6gretap0\x00'}) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:31 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) getuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6}, 0xfffffd0b) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f00000002c0)=ANY=[], 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:31 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000380), 0x4) 22:01:31 executing program 2: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvfrom$inet(r0, &(0x7f0000000000)=""/189, 0xbd, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) 22:01:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) 22:01:31 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe7}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") keyctl$join(0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080)=0x1, 0x3) 22:01:32 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) 22:01:32 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x3, 0x11, 0x0, @local, @local={0xfe, 0x4a00}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 22:01:32 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) memfd_create(&(0x7f0000000140)='#cpusetem0\x00', 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000340)=0xe8) pipe2(&(0x7f00000006c0), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:32 executing program 5: madvise(&(0x7f0000b45000/0x4000)=nil, 0xfffffffffffffe77, 0x9) 22:01:32 executing program 1: clone(0x0, &(0x7f0000000280), &(0x7f0000744000), &(0x7f0000001880), &(0x7f0000001900)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000540), &(0x7f00000006c0)) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000016) 22:01:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@delsa={0x28, 0x11, 0x95180b15fede04ab, 0x0, 0x0, {@in6=@remote}}, 0x28}}, 0x0) 22:01:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fallocate(r0, 0x0, 0x0, 0x0) 22:01:32 executing program 2: unshare(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) clock_adjtime(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 22:01:33 executing program 4: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") keyctl$update(0x2, 0x0, &(0x7f0000000300), 0xfffffdff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x298) 22:01:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xfffffd99}}, 0x0) 22:01:33 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@known='security.selinux\x00', &(0x7f0000000000)='\x00\x00\x00\x00\x00', 0x5, 0x3) 22:01:33 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x20000000000231, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x0) 22:01:33 executing program 1: getitimer(0x1, &(0x7f0000000200)) pipe2(&(0x7f0000000140), 0x0) sched_yield() ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000280)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="42805da0be0fef69dc0f4201eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000480)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x5c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000000c0)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000180)}, 0x10) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000240)) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) [ 391.755356] audit_printk_skb: 30 callbacks suppressed [ 391.792306] audit: type=1401 audit(1537308093.877:587): op=setxattr invalid_context=00000000 [ 391.859807] audit: type=1401 audit(1537308093.977:588): op=setxattr invalid_context=00000000 22:01:34 executing program 5: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getuid() getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000340)=@nfc, 0x80) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:01:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @empty={[0xfffffdef]}}, 0x1c) 22:01:34 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)='W', 0x1) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000200), 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000280)=""/254, 0xfe}, 0x0) 22:01:34 executing program 2: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000380)='cgroup.subtree_control\x00', 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) socketpair(0x0, 0x0, 0x0, &(0x7f00000005c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000640)='cgroup.subtree_control\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000001c0)=""/67, 0x43) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000020c0)={{{@in6=@remote, @in6=@remote}}, {{@in=@dev}}}, &(0x7f00000021c0)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000002200)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) syz_execute_func(&(0x7f0000000440)="66cff3430f1ae7c461f92bba00000000c461f9e6a20b0000003644d16441006466460f38156cec0bc401f92b8f998999990f1a9018000000f243d96b036566430ffcf4") 22:01:34 executing program 4: setpriority(0x2, 0x0, 0x3a5) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5410f71e2006766f342cd570f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) recvmmsg(r0, &(0x7f0000003a00), 0x0, 0x0, &(0x7f0000003b40)) 22:01:35 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x3) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = dup2(r0, r0) getpid() ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, "ff3e5b90dd9a57551db8a74d135f99c3656f575650bfaf664adcf9080f7d1e89e02be68232a126c072e36525bbe07b2881d7ea6a4295cdaec389b006e888d747", "681883712000000000000000032072dbe79fa3af834dbd5714871e0cef1455f3e32043b016476c9646d3bbe55c0916f784e966e7d1aed58cfac20da550b6c7dc", "22995e9436e5213d91f23ed81b55ff9bd0f68b72cd771e6d531f4f5eb6a52afa"}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) 22:01:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f9, &(0x7f0000000080)={'sit0\x00', @ifru_data=&(0x7f0000000500)="44bce94c94291e79968d4ca4f9e3c05f2c59aabc54cc510c2d97f8e8dc8895b6"}) 22:01:35 executing program 5: socket$inet6(0xa, 0x100004, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'vlan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000280)="42805da0be0fef699c0f01fecfc4e161763fd69d0fe00ff01af3f0817e768cc80000000081b5e5bc2b0000002167660f382a6b00641c7366776643d5c7a169e985fe5e000075450f2e1ac4010d64ac1e5d31a3b744dbe2c4a1c95fbf9222a25c0703") 22:01:35 executing program 2: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) clock_getres(0x0, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000700)="42805da0120fef69dc0f01eece73fe19fa380f38211af3c4c20d2d6e0cc481b5e5bc2b0000002167f00fbab204000000ca3b2179dae5e541cc75fa1afa1ac4010d64ac1e5d31a3b744dbe271fbc4c2c9062f") seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) syz_emit_ethernet(0x0, &(0x7f0000001a80)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:01:35 executing program 0: syz_emit_ethernet(0x9e, &(0x7f0000000140)={@local, @dev, [], {@ipv4={0x800, {{0x13, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1, {[@generic={0x89, 0x2}, @ra={0x94, 0x6, 0x7}, @rr={0x7, 0xf, 0x1, [@remote, @empty, @multicast2]}, @end, @lsrr={0x83, 0xf, 0x8, [@rand_addr=0x5, @multicast1, @loopback]}, @timestamp={0x44, 0x10, 0x0, 0x0, 0x0, [{[], 0x7fffffff}, {[], 0x3ff}, {}]}]}}, @gre}}}}, &(0x7f0000000040)) 22:01:35 executing program 3: setrlimit(0x7, &(0x7f000046eff0)) memfd_create(&(0x7f0000000000)='\x00', 0x0) 22:01:35 executing program 1: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:01:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='stat\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 22:01:36 executing program 3: syz_emit_ethernet(0x13e, &(0x7f0000000740)={@local, @random="177f97fea2fd", [], {@ipv6={0x86dd, {0x0, 0x6, "053f09", 0x108, 0x3c, 0x0, @dev, @mcast2, {[], @gre={{}, {}, {}, {}, {}, {0x8, 0x6558, 0x0, "db7dbafc331e3974aae36362adc813186f732d871db02b12e5fb6c5d008d422c6585e95f0ad7c2a2baca034b030200e7744cc24469e1cca8f1dd68e8bb8ccb921cf5ec00c615b8c037579d6f530097d3c4a5f65968369cf678b045703eb1cac1a13f899a2f3615eacdbdd482a3c39d00d73ea897299dd1b6d5175552edb606bac700241c850b109c4bc83094b2d5de40d1f2cb54d1f6968830525ee24016eabce4c50dbaba89a6f5bf20e576eda6fb6968fd2bb456b5906e41d33ab69a1c743ce0e31950"}}}}}}}, &(0x7f0000000cc0)) 22:01:36 executing program 2: io_setup(0x57, &(0x7f0000000040)) io_setup(0x5, &(0x7f0000000080)) io_setup(0x200, &(0x7f0000000100)) 22:01:36 executing program 4: clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') getgroups(0x400000000000015c, &(0x7f0000000200)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) pipe(&(0x7f0000000240)) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000480)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000640)={{0x0, @dev, 0x0, 0x0, 'none\x00'}, {@local}}, 0x44) munmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000008c0)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18}, 0x18) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000780)) getgroups(0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000440)=0x383) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000840), &(0x7f00000004c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f00000005c0)) getgroups(0x0, &(0x7f00000004c0)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) getresgid(&(0x7f00000001c0), &(0x7f00000003c0), &(0x7f0000000200)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 22:01:36 executing program 3: pipe2(&(0x7f0000000180), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000640)) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)=ANY=[]) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) gettid() lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001940), &(0x7f0000001980)=0xc) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000019c0)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000005c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) lstat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002040)={{{@in6=@loopback, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002140)=0xe8) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:36 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xffffffffffffff84) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) prctl$intptr(0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f376646490f3838523044c19086d962788f35c935c97dc4e17c510c5279fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:36 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x104) 22:01:37 executing program 5: time(&(0x7f0000000080)) keyctl$set_reqkey_keyring(0x7, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) pipe(&(0x7f0000000d40)) getegid() chroot(&(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:01:37 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x3}) 22:01:37 executing program 1: munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @broadcast, 0x0, 0x0, 'lblcr\x00'}, {@broadcast}}, 0x44) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000080), &(0x7f00000000c0)}}, &(0x7f00000001c0)) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000400)=@req3, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000140)=0xc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000380), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) memfd_create(&(0x7f00000002c0)="68d903dad7726c", 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000340)) creat(&(0x7f0000000240)='./file0\x00', 0x0) 22:01:37 executing program 2: clock_nanosleep(0x7, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={0x0, {}, {0x2, 0x0, @loopback}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='yam0\x00'}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001980)={{{@in6, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001a80)=0xe8) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000140)=0x40) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001ac0)={0x0, 0x1, 0x6, @broadcast}, 0x10) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000002c0)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000340)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300)={0x2, 0x0, @multicast2}, 0x10) syz_execute_func(&(0x7f0000000080)="42805da01245cf0f01eece0f380bc2470f006f92380f69df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f46f0c92e470f9e24b6d60703") 22:01:37 executing program 0: keyctl$set_reqkey_keyring(0xb, 0x654b94ce46fbec2e) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000180)=0x44) sched_yield() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fcdb8d37c41c4c287d2388008f26b14a95a8f150c355ad5e81535e556973074e546ac905ee5326267bba8aa07e9b16b43940558bfc40dda884d277ec5f6dfeae", "d8722cb7fbc9fb0792a81fe557b208c2f1b7ba21709d76ef3a78d0e6c29a2507"}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:37 executing program 3: memfd_create(&(0x7f0000000000)='\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={@local}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}, 0x10) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000340)) socket$nl_netfilter(0x10, 0x3, 0xc) delete_module(&(0x7f00000004c0)='cgroupvmnet1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000500)=""/117) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000400)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:01:38 executing program 5: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_newaddr={0x34, 0x14, 0x287396a7f262e109, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_CACHEINFO={0x14}]}, 0x34}}, 0x0) [ 396.399817] tmpfs: No value for mount option 'hÙÚ×rl' 22:01:38 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60aabc7d0000000000000000aa00000000000000000000ffffac1414000420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb000000002000000002000000000000000000000008006558000000000000002000000000000000"], 0x0) [ 396.536993] audit: type=1400 audit(1537308098.657:589): avc: denied { create } for pid=10978 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:01:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f00000004c0), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@rand_addr}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4={[0x9, 0x0, 0xffffff7f]}, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 22:01:39 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x2000000005) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 22:01:39 executing program 5: r0 = socket$inet6(0xa, 0x1200000000000002, 0x0) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x0, @dev}, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1100000000000000110000006700005c45"], 0x11}, 0x0) 22:01:39 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000180)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x2) 22:01:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4c}, {0x6}]}, 0x10) 22:01:39 executing program 1: getrandom(&(0x7f0000000480)=""/104, 0x4b, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x40}, 0x28, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000340)=""/165) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getgroups(0x0, &(0x7f0000000240)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") timer_getoverrun(0x0) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:01:39 executing program 3: futex(&(0x7f0000000080), 0x3, 0x0, &(0x7f0000000000), &(0x7f00000acffd), 0x0) 22:01:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 22:01:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() clock_gettime(0x0, &(0x7f0000000400)) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000180)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000002c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000640)=@get={0x1, &(0x7f0000000680)=""/151}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000c40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:40 executing program 1: truncate(&(0x7f0000000040)='./file0\x00', 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, "57dbeb4194df61181360d4f39c6ef839ccf24bc79538b46846015f8f4147b30b"}) prctl$setname(0xf, &(0x7f00000001c0)='\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000280)="42805da0c1c40185635afe660fe8e469919191913d06440f18400e770f78993d233d23410feefa437400660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") 22:01:40 executing program 3: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:40 executing program 5: munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munlockall() syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000001c0), 0xffffffff) 22:01:41 executing program 5: unshare(0x20400) r0 = socket(0x2, 0x3, 0x6) setsockopt(r0, 0xff, 0x1, &(0x7f0000000080), 0x0) 22:01:41 executing program 2: clock_gettime(0x5, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) fstat(0xffffffffffffffff, &(0x7f00000005c0)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) setregid(0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001600)={0x8, "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", 0x1000}, 0x1006) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000640)=0x14) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000007c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000780)={'syzkaller0\x00', {0x2, 0x0, @remote}}) getgid() ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0x78}, 0x78) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") dup(0xffffffffffffffff) memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) clock_gettime(0x0, &(0x7f0000000040)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000080), 0x18) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000006c0)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 22:01:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x5, 0x4) 22:01:41 executing program 0: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:01:41 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getgroups(0x0, &(0x7f0000000140)) accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000200)={0x7}, 0x7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5416a45c462010d42002e660fe09500000000660f758233949cddee31a3b786e29885c4227992dd289f9f") 22:01:42 executing program 3: ustat(0x2, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) getgroups(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") getuid() pipe2$9p(&(0x7f00000001c0), 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000), 0x4) 22:01:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000280)={0x6}) 22:01:42 executing program 3: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet(0x2, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 22:01:42 executing program 5: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:42 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x6, 0x4) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/143, &(0x7f00000000c0)=0x465) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) sendto$inet6(r0, &(0x7f00000000c0), 0xfffffffffffffe66, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x100000002, @mcast2}, 0x1c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000000), 0x10) 22:01:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x24080000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) 22:01:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000002480)=[{{&(0x7f0000000200)=@in6={0xa, 0x0, 0x3}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000a00)}}], 0x1, 0x0) 22:01:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x7ffffff7) 22:01:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f000000f000), 0xc, &(0x7f0000bd7000)={&(0x7f0000c91000)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in=@loopback, 0x0, 0x32}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4309(rfc4309(rfc7539(xts(twofish),rmd320-generic)))\x00'}}}]}, 0x13c}}, 0x0) 22:01:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 22:01:45 executing program 1: ustat(0x7, &(0x7f0000000080)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, &(0x7f0000000040)}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)=""/53, &(0x7f0000000280)=0x35) 22:01:45 executing program 3: utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x77359400}}) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000500)=0x80) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000480)) mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000140)=""/173) syz_execute_func(&(0x7f0000000340)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7ae98f3007f") 22:01:45 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x20004e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x20000800, &(0x7f0000deaff0), 0x10) 22:01:45 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) stat(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000300)) 22:01:45 executing program 2: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) fchmodat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 22:01:46 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) keyctl$set_reqkey_keyring(0x4, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @remote}, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) connect(0xffffffffffffffff, &(0x7f0000000180)=@can, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='./file0\x00') syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 22:01:46 executing program 1: clock_gettime(0x6, &(0x7f0000000740)) pipe(&(0x7f0000000780)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000580)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000800)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000001c0)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e96864f2d88a5a2bb009d5bbce1753762ebb2be065de2bdc5137ed2fa88cf71dde84668963895ebfe634128d146562b24f6696dee22210e059f16d9280a4655f", "b1f24c561747e8c7ec6f7bafa76d6fa1b6f0b597bd2742375203bd2948f9ab12"}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000180)) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) chroot(&(0x7f00000003c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:01:47 executing program 4: request_key(&(0x7f0000000280)='logon\x00', &(0x7f0000000380), &(0x7f0000000440)='asymmetric\x00', 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000003c0)=0xc) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpgrp(0xffffffffffffffff) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getgroups(0x0, &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getpid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) geteuid() lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpgid(0x0) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400), &(0x7f0000001440), &(0x7f0000001480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}}}, &(0x7f00000018c0)=0xe8) getgroups(0x0, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) getresuid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) getgroups(0x0, &(0x7f0000000440)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) getuid() getegid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000002200)=0xc) stat(&(0x7f0000002240)='./file0\x00', &(0x7f00000002c0)) geteuid() getgid() getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002300)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000002400)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002440)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000024c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000025c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'pids'}]}, 0x5) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'pids'}, {0x2d, 'rdma'}]}, 0xc) 22:01:47 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:47 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x20004e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x20000800, &(0x7f0000deaff0), 0x10) 22:01:47 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000000c0)) utimensat(0xffffffffffffffff, &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000040)={{}, {0x0, 0x2710}}, 0x4) 22:01:47 executing program 1: unshare(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() geteuid() lstat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000000080), &(0x7f00000036c0)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003980)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000003a80)=0xe8) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) getuid() getresgid(&(0x7f0000003dc0), &(0x7f0000003e00), &(0x7f0000003e40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) geteuid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @dev}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syslog(0x0, &(0x7f0000000400)=""/225, 0xe1) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:47 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xa619, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 22:01:47 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000040)=""/57, 0x39, 0x0) 22:01:48 executing program 3: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:48 executing program 5: clock_gettime(0x0, &(0x7f0000000180)) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) getpgrp(0x0) getpid() syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000240)={{0x2, 0x0, @multicast1}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) syz_execute_func(&(0x7f0000000080)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:01:48 executing program 2: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x4000000) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:48 executing program 1: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000c7f000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) prctl$intptr(0x4, 0x14ed) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f000050aff4)) 22:01:51 executing program 5: unshare(0x20400) preadv(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0) 22:01:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 22:01:51 executing program 1: prctl$intptr(0x1d, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/244, 0xf4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000181, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 22:01:51 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000080)) socket$unix(0x1, 0x0, 0x0) prctl$void(0x0) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") inotify_init1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) bind$inet6(0xffffffffffffffff, &(0x7f0000000ac0)={0xa, 0x0, 0x0, @local}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a80)=0x14, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000008c0)={0x0, {{0x2, 0x0, @remote}}}, 0x88) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) getpgid(0x0) 22:01:51 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @mcast1, 0x1f}, 0x1c) 22:01:51 executing program 3: statfs(&(0x7f0000000400)='.\x00', &(0x7f0000000480)=""/145) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000380), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000900), 0xc, &(0x7f0000000ac0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) getrusage(0x0, &(0x7f0000000700)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000a00)=ANY=[]) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) 22:01:51 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1200000000000802, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x6c}, 0x0, @in=@loopback}}, 0xe8) bind$inet6(r1, &(0x7f0000f5dfe4), 0x1c) dup3(r0, r1, 0x0) [ 409.140371] audit: type=1400 audit(1537308111.257:590): avc: denied { create } for pid=11214 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 409.191836] audit: type=1400 audit(1537308111.307:591): avc: denied { write } for pid=11214 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 409.532454] audit: type=1400 audit(1537308111.657:592): avc: denied { read } for pid=11214 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:51 executing program 5: unshare(0x0) memfd_create(&(0x7f0000000080)='\x00', 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0a95dde0f3a6086a3088041cb9135919199442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a38660f38340a0379dfb8d6adbe90dfe29f7f") getuid() getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 22:01:51 executing program 0: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffc) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000280)}) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) prctl$intptr(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)={'syz0'}, 0x4) clock_gettime(0x0, &(0x7f0000000340)) sched_setscheduler(0x0, 0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 409.938232] audit: type=1400 audit(1537308112.057:593): avc: denied { create } for pid=11214 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:52 executing program 2: gettid() fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000900)=0xc) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=""/174, &(0x7f00000000c0)=0xae) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000e00)) waitid(0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000380)) flock(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000500)=""/165) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)) getgroups(0x0, &(0x7f00000009c0)) getgid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000ac0)) getgid() getegid() getresgid(&(0x7f0000000b40), &(0x7f0000000940), &(0x7f00000009c0)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) lsetxattr$system_posix_acl(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f0000000e00)=ANY=[], 0x0, 0x0) 22:01:52 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002d80)) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = gettid() getpid() waitid(0x2, r0, &(0x7f0000000140), 0x8, &(0x7f0000000180)) [ 410.099948] audit: type=1400 audit(1537308112.217:594): avc: denied { write } for pid=11214 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') rt_sigaction(0x2a, &(0x7f0000000080)={0xfffffffffffffffe}, &(0x7f00000000c0), 0x8, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000240)=""/4096, 0x88}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000001240)={&(0x7f0000000180)={0x68, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040090) 22:01:52 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000360000)="2400000052001f0014f9f407002c04000a00071008000100feffffff0800000000000000", 0x24) 22:01:53 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000)) vmsplice(r1, &(0x7f0000101000)=[{&(0x7f0000a68000)="f0", 0x1}], 0x1, 0x0) ppoll(&(0x7f0000fb8fb0)=[{r2}], 0x1, &(0x7f0000006000)={0x0, 0x989680}, &(0x7f0000008ff8), 0x8) 22:01:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x0, 0x7}) 22:01:53 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4) getpgid(0x0) gettid() getpid() getpgid(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe(&(0x7f00000001c0)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) socket$unix(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) setitimer(0x0, &(0x7f00000006c0), &(0x7f0000000680)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0410fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa0f9a5f0beefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$inet(0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) memfd_create(&(0x7f0000000400)='eql\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@multicast1, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000003c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @rand_addr, @remote}, &(0x7f0000000b00)=0xc) 22:01:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="95181c8871fd14df7c16241b1c3c334e2ef204000000000000", 0x19) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5a5, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) 22:01:53 executing program 1: madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000aaf000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f00008e5000/0x3000)=nil) 22:01:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002880)={&(0x7f00000000c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000140), 0x0, &(0x7f00000025c0)=[{0x18, 0x1, 0x1, 'u'}], 0x18, 0x81}, 0x40040) 22:01:53 executing program 1: pipe2(&(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000580)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:54 executing program 2: getpgid(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000003c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000480)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 22:01:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 22:01:54 executing program 3: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) getresgid(&(0x7f00000013c0), &(0x7f0000000180), &(0x7f0000000280)) geteuid() getgroups(0x0, &(0x7f0000001480)) timerfd_create(0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000014c0)='cgroup.type\x00', 0x2, 0x0) stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in6, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000002fc0)=0x2d0) fstat(0xffffffffffffffff, &(0x7f0000003000)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000003100)) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") [ 412.050590] audit: type=1400 audit(1537308114.167:595): avc: denied { create } for pid=11280 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 412.205796] audit: type=1400 audit(1537308114.327:596): avc: denied { write } for pid=11280 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:54 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000700)={@random="c7c81dc5988b", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x10, 0x2c, 0x0, @dev, @local, {[], @dccp={{0x2c00, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}}}}}}}, &(0x7f0000000000)) 22:01:54 executing program 5: getitimer(0x0, &(0x7f0000000580)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) getpriority(0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000800)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) dup(0xffffffffffffffff) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000180), 0xc) pipe(&(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000005c0)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) socket$inet(0x2, 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000007c0)=0xe8) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) recvfrom(0xffffffffffffffff, &(0x7f0000003880)=""/4096, 0x1000, 0x0, &(0x7f0000002040)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0xfffffffffffffedd) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000840)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@local}, &(0x7f0000000340)=0x14) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000680)={0x0, @aes256, 0x0, "8ab83ba5d87594ef"}) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x80) [ 413.580634] audit: type=1400 audit(1537308115.697:597): avc: denied { create } for pid=11319 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 413.693845] audit: type=1400 audit(1537308115.817:598): avc: denied { write } for pid=11319 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 413.835326] audit: type=1400 audit(1537308115.957:599): avc: denied { read } for pid=11319 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:01:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x2, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendto$inet(r0, &(0x7f0000000000)='_', 0x1, 0x0, &(0x7f0000000b00)={0x2, 0x0, @loopback}, 0x10) recvfrom$inet(r0, &(0x7f0000000b40)=""/4096, 0x1000, 0x2, 0x0, 0x0) 22:01:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) chroot(&(0x7f000009a000)='./file0\x00') 22:01:56 executing program 1: mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f0000000440)=0x1e) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@local, @remote, @dev}, &(0x7f0000000180)=0xc) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x58) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000340)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") clone(0x0, &(0x7f0000000340), &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000740)) 22:01:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000280)=0x2fe, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000560e, &(0x7f0000e68000)={0x2, 0x4004e23, @local, [0x0, 0x2]}, 0x10) shutdown(r1, 0x1) 22:01:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000100)=0x54) 22:01:56 executing program 5: futex(&(0x7f00000000c0), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x1) 22:01:56 executing program 5: getitimer(0x1, &(0x7f0000000200)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) getgroups(0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getgroups(0x0, &(0x7f00000025c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000002840)) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgroups(0x0, &(0x7f00000029c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004180)) 22:01:56 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8921, &(0x7f00000001c0)='bond0\x00') 22:01:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x2b, [], 0x0, &(0x7f00000001c0), &(0x7f0000000080)=""/43}, &(0x7f0000000340)=0x78) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000300), 0x1b5, &(0x7f0000000600)}}], 0x2, 0x0) 22:01:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'rose0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 22:01:56 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() ioprio_get$pid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000040)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f5417545844d4dbc2ebcad64ac1e46d9f8e37f") 22:01:57 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getgid() prctl$getname(0x10, &(0x7f0000000580)=""/169) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340), 0xffffffffffffff09) 22:01:59 executing program 4: r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 22:01:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 22:01:59 executing program 3: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000380)=ANY=[], 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:59 executing program 5: prctl$getname(0x10, &(0x7f0000000600)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000540), 0x4) preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$getname(0x10, &(0x7f0000000940)=""/219) syz_emit_ethernet(0x0, &(0x7f0000000a40)=ANY=[], &(0x7f0000000480)) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x389756b1353683f6, 0x120, 0x0, 0xffffffffffffffeb) 22:01:59 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=""/174, &(0x7f00000000c0)=0xae) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) flock(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000180)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") 22:02:00 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000140)=@ethtool_stats}) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getgid() bind(0xffffffffffffffff, &(0x7f0000000540)=@sco, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:02:00 executing program 3: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) epoll_create1(0x0) getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000840)=""/223) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) pivot_root(&(0x7f00000000c0)='./file0/../file0/file0\x00', &(0x7f00000005c0)='./file1\x00') truncate(&(0x7f00000002c0)='./file0/file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000200), 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000280)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:00 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 418.750799] audit: type=1400 audit(1537308120.867:600): avc: denied { create } for pid=11392 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_newneigh={0x28, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r1, 0xfffffffc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x400000) 22:02:01 executing program 0: r0 = socket(0x10, 0x20000000000003, 0x0) recvmmsg(r0, &(0x7f0000007040)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000004d40)=[{&(0x7f0000003b80)=""/184, 0xb8}, {&(0x7f0000003c40)=""/4096, 0x1373}, {&(0x7f0000004c40)=""/125, 0x7d}, {&(0x7f0000004cc0)=""/87, 0x57}], 0x4, &(0x7f0000004dc0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f00000070c0)={0x0, 0x989680}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000cf40)={&(0x7f0000000240), 0xc, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="04000000000000000000030000009e18e252d1db90aefe016d714d624f03b0c5aa51a96e1a9b0ba111204962c640ba1fd0d46b402c16b3818be902db0f4ea8ea55f4d59b35ace0a19666eee5b43bdf86da9c0a52da0219ea57173251d716812eece086dd7a3f0ff14eaa20ea8da95f234e9c3c09bc9fe5d748b61a8f3efd55e1fab1e5aa2ea96ad8e02de2c3062e140e63f3f0355d0509ca808fe5abff45814d57906fc96d2e9d4ec997f2cf24ef6e225d66cdcdc0975043bf7ba597b68481edf259476586285a6512249efde0a79cdcd1db3c6d80"], 0x1}}, 0x0) write(r0, &(0x7f0000000180)="220000005e000721004f10f7d0ebd900000000003c0253176d77847c26485a3dd4ee", 0x22) 22:02:01 executing program 1: setrlimit(0xfffffffffffffffd, &(0x7f0000000240)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") [ 419.247478] audit: type=1400 audit(1537308121.367:601): avc: denied { create } for pid=11421 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 419.446522] audit: type=1400 audit(1537308121.567:602): avc: denied { write } for pid=11421 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 419.559545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=94 sclass=netlink_route_socket [ 419.971057] audit: type=1400 audit(1537308122.087:603): avc: denied { read } for pid=11421 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 420.044383] audit: type=1400 audit(1537308122.167:604): avc: denied { create } for pid=11421 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:02 executing program 4: eventfd2(0x0, 0x0) readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f0000000180), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:02 executing program 5: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c2000/0x4000)=nil, 0x4000, 0x0, 0x212, r0, 0x0) mprotect(&(0x7f00001c1000/0x2000)=nil, 0x2000, 0x0) 22:02:02 executing program 0: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000180)={{0x0, @loopback, 0x0, 0x0, 'rr\x00'}, {@dev}}, 0x44) clock_gettime(0x0, &(0x7f0000000300)) getpid() sched_rr_get_interval(0x0, &(0x7f0000000400)) getresuid(&(0x7f0000000200), &(0x7f0000000440), &(0x7f0000000480)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ustat(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:02 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000600)=ANY=[@ANYBLOB="e0000001000400000000000000005cf4"], 0x1) 22:02:02 executing program 1: clock_gettime(0x3, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) 22:02:02 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) 22:02:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) close(r0) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) [ 420.524452] audit: type=1400 audit(1537308122.637:605): avc: denied { create } for pid=11452 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:02 executing program 3: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") sendto$inet6(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, &(0x7f0000000340)}, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) geteuid() clock_gettime(0x0, &(0x7f0000000640)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) futex(&(0x7f0000000600), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000340), 0xc, &(0x7f0000000700)={&(0x7f0000000940)={0x14}, 0x14}}, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000540)=""/147) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000780), 0xc, &(0x7f0000000800)={&(0x7f0000002d00)={0x14}, 0x14}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) [ 420.573814] audit: type=1400 audit(1537308122.697:606): avc: denied { write } for pid=11452 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:02 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f000000bc80)=[{{&(0x7f000000b040)=@rc, 0x80, &(0x7f000000b100), 0x0, &(0x7f000000b140)=""/135, 0x87}}], 0x1, 0x60, &(0x7f000000bd80)={0x77359400}) [ 420.916942] audit: type=1400 audit(1537308123.037:607): avc: denied { read } for pid=11452 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40042406, &(0x7f0000002e00)="2f3ba9c4838e9eb7b68756dfa67c68c0af55815b895ce2e263e929221461a5b0ed28459039de0e") 22:02:03 executing program 5: r0 = socket$inet(0x2, 0x80003, 0x400002000000084) getsockopt$inet_buf(r0, 0x0, 0x50, &(0x7f0000000080)=""/46, &(0x7f0000000340)=0x3) [ 421.377477] audit: type=1400 audit(1537308123.497:608): avc: denied { create } for pid=11471 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 421.386077] audit: type=1400 audit(1537308123.497:609): avc: denied { create } for pid=11452 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:03 executing program 1: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000100)) dup(0xffffffffffffff9c) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) 22:02:05 executing program 4: r0 = memfd_create(&(0x7f00000000c0)="f1748e825d510b6c487ca098b6b23a298b375afce90c05bb7e6f37767960b450", 0x0) pwritev(r0, &(0x7f0000000340), 0x0, 0x0) 22:02:05 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)={'#! ', './file0'}, 0xb) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:02:05 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@remote, @multicast1}, &(0x7f0000000080)=0x8) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a0effafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") pipe2(&(0x7f0000000280), 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:02:05 executing program 0: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sockfs\x00', 0x0, 0x0) 22:02:05 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0/file0/file0\x00', &(0x7f00000006c0)='trusted.overlay.upper\x00', &(0x7f0000000900)={0x0, 0xfb, 0x15, 0x0, 0x0, "65cefbbab0952434272ce5a3068d1147"}, 0x15, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001980)) socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) 22:02:05 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0x71) 22:02:05 executing program 0: getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xffffff95) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioprio_get$pid(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) gettid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") prctl$getname(0x10, &(0x7f0000000940)=""/219) syz_emit_ethernet(0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000003c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:02:06 executing program 2: gettid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc8000000000fd9595df00fbab204000000ca6b2979dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001dc0)=0xe8) getuid() getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006a00)={{{@in=@local, @in=@multicast1}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f0000006b00)=0xe8) lstat(&(0x7f0000006b40)='./file0\x00', &(0x7f0000006b80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006cc0)={0x0, 0x0, &(0x7f0000006980), 0x0, &(0x7f0000006c00)}, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x4) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000300)) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000040)) 22:02:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x1, 0x11d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x2, &(0x7f0000000000), &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x16d) [ 424.272863] audit_printk_skb: 33 callbacks suppressed [ 424.278099] audit: type=1400 audit(1537308126.397:621): avc: denied { create } for pid=11528 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:06 executing program 5: clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) [ 424.495377] audit: type=1400 audit(1537308126.597:622): avc: denied { write } for pid=11528 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:06 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000300)=""/140) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000140)) 22:02:06 executing program 0: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x11, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000001580)=0xffffffffffffffc4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000180), 0xc, &(0x7f0000001500)={&(0x7f00000015c0)={0x14}, 0x14}}, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000200)=@proc, 0xc) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") [ 426.019394] audit: type=1400 audit(1537308128.137:623): avc: denied { create } for pid=11551 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:08 executing program 4: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) select(0x40, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={0x0, 0x7530}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000780)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000700)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='veth1_to_bridge\x00'}) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0xfffffc30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:08 executing program 0: r0 = memfd_create(&(0x7f0000813ffa)='{\x00', 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) 22:02:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2={0xff, 0xe}}, 0x1c) 22:02:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:02:08 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0/file0\x00', 0x2) 22:02:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x80000000, 0x4}) 22:02:08 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaf680c200000086dd60aabc7d004400ffffff7f000000000000000000000000aa00000000000000000000ffffac1414000420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 22:02:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000700)}}], 0x1, 0x41, 0x0) 22:02:08 executing program 3: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) write(r0, &(0x7f0000000900)="89f9d765312b4044aedbefb0967bdae72ee5094371136a6477ba0a51a2969dbc2d4028ac7b5af67f178f9314ea2bb3ac1c442eaf749c21ae2af8e39a40c3dc032e6f8eb738786a79df71302ff3b5d42731597d995bed6103ff63b9a908bcc05e02e4f4f692bdf4d3282f62d6928117f82c2dae48742dac857de846096e82c1a02e1edcadda721a3f8dc9a54da05d467ed35b6f931d8686986960e756048c61c2a2c374c318d21d7a7ef550779190066e82ea3f6724a9f61ff028ec7e8d7a04352e7a78f777a68b823abb646bdc55dbde285ce15bf45820f0ae20e4023f57c71f8b41e08eff14c3441485c6f54a30750c780852dad879d6d4be7243bd07f841f8903fcb65f7c23d6b4f70fe48b54577449cfcbc4d5dbefb8b465d45bc2d11afbe7bfbe6ca76ac259e634eebf8db694ff02fe2b4c80783b443ef68287e9cf7cbcc2ee196f10c4ffb3f59e4921e0f9f08cba9a2c56c49fa7465b4836da5b2d9b142763889caa718d8a4fcb2f3ef6dc6185708fb1e0f9081d29fb3defae8c525f47437c7835b4eac8f86e2a22a81eff4120340e4a379446aac45dbff791d147805cd2748d74b8996c9b51ec03b410ef8fe126117fbf106795bc1b25d8dd786b6496bd743b7c75c638b516214ff56ec99a9c0f2919fa781cd8b4f2f2e425a6780c630a05c8e60011bc8e10055a6b6b652e5a13c73fd96f79038a65d6991ac38899ab98486d92bbcffdcf39a08a248ae1045ff8c6123de2f15d9ac360a3497c07001a3a1936ff1c03194ace131d380f515629ff016bd890ff822704c0db8bc68efad2eace5466628e7d6c2f2b3043698c46fdd62588fc54b72a786af0d026353879892c58007f7988a3f2240a43303218cc1df27807bfbde117c505f060396850a82459830a89a6a8601ea2e47f2e41379d110b96576f8f7705bba7ec63d6b44ccf84073cf9bdcf1aee48cb60c2f6dd3e89f3626a5e23339ea99c918d76a43fecf5601f7550e8eaefa4d84f1143320599daf7699858b2bf408e9093aa91d6dd9ae39d8decf3f7a199b0c1918d47be3b7aeff9a8c10efabe787b43141e7abaa4317158864b0361568140ab79cade1223c3ef81da4c4eefdd5b21fcc1b87872fc3b346737905589b84ba9814679b7510ed9b4f290083ee634ae12243ccc63413d7bc35eee0d1a4bc9dd33c37f5130303edddfc2636ffbf1ee0febb953436710c2ed9bd001d2ebe878788ddf7f7ad55b7a8cbcb348e82cd65b59315858086606115d04a3cda0e4af2a703afe09e4afedf00d5fbb2284df9af1d1ec9f15356c58fdcde45fff250568347f3b0b49e11e44c0a4d98a1e3393ce5d76614990f23b2e146842b166fb070894c128f957b0cc7d80a16275efd15659e0f81990062ebfdf9454d12e63d1ce1dad7848fcbab642a0d62ebb17abc824883e4c6e1e81992f28f5bbd7b26e2645c7941b03dd2f27c29baa2412976a05fa13d8fc4d6bd152a8568d986a9cf605b8b4a61600481e01bdd74c96d73390518add968100ac742aaf5dd91b4ccf0868ee3ef7f12c32298737dea65bd5d7161dd679b4dd6799aa086bf3b8c889780ac102b7b1ebcf2569dd77f201d74d94a61400ced9c613414012b451628a96e6cc8fe738e964940f7b753065677776f3b5398975aeac974fced560667cead03a8976eb42296f4e1bca5588d5d544cbca8588215a2f5ef7a5fc1a07438d3a3e05d21eb30d46f1688543d4327d36e07635396eaab4e9bc862ee9c7fa24de38c5cbf8fa5afd024116bc84854d01072165ecc4bb415d94a333e0d91e9cf6fda5a2c244a585e3a32c95398f44800c578faf4a2ccc5979664db7a55aa5cc02789f84321ccaeed4f37dd48c8d1484ade0588fc4255ec8780534a693e2bfe88b622034552084492c6757429239bbe8dad8b904e58007639ca773344040a441dc0027a46c22198f3d0b0588e164881a9fc7a85a63c459b0d002e3d890edd250742d363e85250badb91a734759baf773c32b177d36eefb662be70", 0x595) sendto$inet(r0, &(0x7f0000000140)="cc1d742a9e9c7023a0", 0x9, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 22:02:08 executing program 5: mkdir(&(0x7f00000013c0)='./file0/\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0/\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, 0x0) 22:02:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x2ee) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) close(r1) 22:02:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x140) 22:02:11 executing program 4: clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:11 executing program 3: getgid() getgroups(0x0, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:11 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) munlockall() accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000180), 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000540)={0x89, 0x7d, 0x0, {{0x0, 0x74, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '%!(ppp1systemnodev', 0x19, 'cpuacct.usage_percpu_sys\x00', 0x0, "", 0x16, '\'md5sumvboxnet1@[%eth1'}}}, 0x89) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) accept4(0xffffffffffffffff, &(0x7f0000000600)=@alg, &(0x7f0000000680)=0x80, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000500)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:11 executing program 5: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=ANY=[], &(0x7f0000000880)=""/42, 0x2a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:11 executing program 1: ustat(0x4, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@mcast1}, &(0x7f0000000240)=0x3bd) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000000c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getgroups(0x0, &(0x7f0000001900)) getpgid(0x0) stat(&(0x7f0000001940)='./file1\x00', &(0x7f0000001980)) stat(&(0x7f0000001a00)='./file1\x00', &(0x7f0000001a40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fstat(0xffffffffffffffff, &(0x7f0000001b00)) lstat(&(0x7f0000001b80)='./file1\x00', &(0x7f0000001bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=""/4096, 0x1000}, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000140)='veth1_to_team\x00') 22:02:11 executing program 2: r0 = socket$packet(0x11, 0x40800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x5}, 0x4) syz_emit_ethernet(0x42, &(0x7f0000000080)={@random="3ddf8422696e", @dev, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @dev, @random="779bd3f4b931"}}}}, &(0x7f0000000100)) 22:02:11 executing program 2: pipe(&(0x7f0000000040)) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) clock_getres(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 429.749914] audit: type=1326 audit(1537308131.867:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11630 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf777fbe9 code=0x0 22:02:12 executing program 5: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:12 executing program 3: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000300)) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:12 executing program 1: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000240)='eth0nodevcpuseteth1@*\',procS|\x00', 0xfffffffffffffff8) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/187, 0xbb, 0x0, &(0x7f0000000700)=@sco, 0x5ef) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:12 executing program 0: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000200), &(0x7f0000000440)=ANY=[]}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'syz_tun\x00'}, 0x18) timer_delete(0x0) 22:02:13 executing program 2: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") sendto$inet6(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, &(0x7f0000000340)}, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) geteuid() clock_gettime(0x0, &(0x7f0000000640)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) futex(&(0x7f0000000600), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000540)=""/147) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) [ 430.976916] audit: type=1400 audit(1537308133.097:625): avc: denied { create } for pid=11656 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 431.155902] audit: type=1400 audit(1537308133.277:626): avc: denied { write } for pid=11656 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 431.631211] audit: type=1400 audit(1537308133.747:627): avc: denied { read } for pid=11656 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 431.722825] audit: type=1400 audit(1537308133.847:628): avc: denied { create } for pid=11656 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:15 executing program 4: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0xd, 0x228, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) 22:02:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0xc0189436, &(0x7f00000000c0)) 22:02:15 executing program 0: clock_gettime(0x2, &(0x7f0000000200)) pipe(&(0x7f0000000d40)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000640)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:02:15 executing program 3: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="0001705f66696c657300") getdents(r0, &(0x7f0000000ea9)=""/407, 0x4ee) 22:02:15 executing program 5: ppoll(&(0x7f0000000100)=[{}], 0x200000000000030d, 0x0, &(0x7f0000000300)={0x1}, 0x8) 22:02:15 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 22:02:15 executing program 5: set_robust_list(&(0x7f00000003c0), 0xd74) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000140)=""/173) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:02:15 executing program 1: unshare(0x8000400) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 22:02:15 executing program 3: creat(&(0x7f0000000340)='./file1\x00', 0x0) mount(&(0x7f00000001c0)=@sr0='/dev/sr0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='minix\x00', 0x25800, &(0x7f0000000280)="215b7b706f7369785f61636c5f616363657373aa8a2d3a6c6f7573657200") 22:02:15 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x200000006) getsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x1b5) 22:02:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) renameat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') 22:02:16 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:02:17 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000780)) quotactl(0x0, &(0x7f0000000340)='./file0/file0\x00', 0x0, &(0x7f0000000600)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') socket$unix(0x1, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000280)={0x77359400}) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:02:17 executing program 1: clock_gettime(0xfffffffffffffffd, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:17 executing program 0: unshare(0x20400) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:02:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast2}, &(0x7f00000002c0)=0x10) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9cec4218d5fa200e000001837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7660fe03cdee2989f7f") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={"c90000000000000000ea00", &(0x7f0000000140)=ANY=[]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000300)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) getgroups(0x0, &(0x7f00000018c0)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) getgroups(0x0, &(0x7f0000001d80)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001fc0)) lstat(&(0x7f0000002000)='./file0/file0\x00', &(0x7f0000002040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000020c0), &(0x7f0000002100)=0xc) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000002140)) getpgrp(0x0) stat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002b00)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002b40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f40), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000034c0)) getuid() getgroups(0x0, &(0x7f0000003500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) lstat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000036c0)) geteuid() stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000037c0)) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003940), &(0x7f0000003980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003c40)=0xe8) 22:02:17 executing program 5: getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="00cc02f6", 0x4, 0x1000020018800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x65, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700), 0x0, &(0x7f0000003780)=""/232, 0xe8}}], 0x1, 0x0, &(0x7f0000003bc0)) 22:02:17 executing program 3: sigaltstack(&(0x7f0000fef000/0x11000)=nil, &(0x7f0000000840)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="61541b992d80"}, 0x14) syz_execute_func(&(0x7f00000009c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) getitimer(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f00000007c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00000001c0)=""/190, &(0x7f0000000080)=0xbe) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000400)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000500)) 22:02:18 executing program 2: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) arch_prctl(0x0, &(0x7f00000000c0)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f000039a000)=[{0x4d}, {0x6}]}, 0x10) 22:02:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8901, &(0x7f0000000140)={'teql0\x00'}) [ 436.128045] audit: type=1400 audit(1537308138.247:629): avc: denied { create } for pid=11751 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:18 executing program 5: keyctl$set_reqkey_keyring(0xf, 0x7) dup(0xffffffffffffffff) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:02:18 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000780)}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) accept4$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000300)=0x10, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 436.916254] audit: type=1400 audit(1537308139.037:630): avc: denied { create } for pid=11751 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 438.289180] audit: type=1400 audit(1537308140.407:631): avc: denied { create } for pid=11792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 438.314646] audit: type=1400 audit(1537308140.437:632): avc: denied { write } for pid=11792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 438.381321] audit: type=1400 audit(1537308140.497:633): avc: denied { read } for pid=11792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 439.087986] audit: type=1400 audit(1537308141.207:634): avc: denied { create } for pid=11792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:21 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) pread64(r1, &(0x7f0000000100)=""/21, 0x15, 0x0) 22:02:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) 22:02:21 executing program 2: clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) [ 439.153650] audit: type=1400 audit(1537308141.277:635): avc: denied { write } for pid=11792 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 22:02:21 executing program 1: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000540)) clock_gettime(0x0, &(0x7f0000000040)) getpid() getpid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getpid() getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000004c0)=0x5) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in=@dev, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000a40)=0xe8) getresgid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) getsockname$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000140)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'bridge0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0476ee5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:02:21 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:21 executing program 5: socket(0xf, 0x803, 0x0) 22:02:21 executing program 5: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") [ 440.064756] audit: type=1400 audit(1537308142.187:636): avc: denied { create } for pid=11821 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:22 executing program 2: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000594000), 0x0) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) close(r0) 22:02:22 executing program 0: futex(&(0x7f00000003c0), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000380), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f0000000600)={0x0, 0xfb, 0x15, 0x0, 0x0, "8b273479517aefc4c1aa524d60e59612"}, 0x15, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) request_key(&(0x7f00000004c0)='id_legacy\x00', &(0x7f0000000500), &(0x7f00000005c0)='\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0), &(0x7f0000000400)='\\em0\x00', 0x0) syz_execute_func(&(0x7f0000000300)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) 22:02:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f00000001c0), &(0x7f0000000240)='\x00', 0xfffffffffffffffe) add_key(&(0x7f0000000200)='logon\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000400)='big_key\x00', &(0x7f0000001500), &(0x7f0000000380)='/dev/ppp\x00', 0x0) [ 440.273975] audit: type=1400 audit(1537308142.397:637): avc: denied { write } for pid=11821 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) [ 440.524922] audit: type=1400 audit(1537308142.647:638): avc: denied { create } for pid=11832 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 440.620524] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 440.704326] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 441.242838] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 22:02:23 executing program 4: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:02:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f0000000240)='GPL\x00', 0x3, 0x0) sync() 22:02:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x0, 0x2, 0x511f, 0xff}]}) 22:02:23 executing program 5: pipe(&(0x7f0000000340)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000640), 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/143) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@remote, @multicast1}, &(0x7f0000000080)=0x8) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) waitid(0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @multicast2}, &(0x7f00000001c0)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@dev, @loopback}) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/22) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) stat(&(0x7f0000000840)='./file0/../file0\x00', &(0x7f0000000c00)) getegid() setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a00)='system.posix_acl_access\x00', &(0x7f0000000d80)=ANY=[], 0x0, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_getres(0x0, &(0x7f0000000400)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 22:02:23 executing program 0: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000640)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) getpgrp(0x0) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) gettid() getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000bc0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@mcast1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000500)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000580), &(0x7f0000000440), &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:02:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) r1 = getpid() ioprio_get$pid(0x2, r1) 22:02:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x0, 0x100010, r1, 0x0) 22:02:24 executing program 1: r0 = socket(0x1e, 0x5, 0x0) sendto(r0, &(0x7f0000000040), 0x0, 0xc4, &(0x7f00000001c0)=@ax25={0x3, {"011837e574f9a9"}}, 0x80) 22:02:24 executing program 3: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000200)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000ac0)=@deltclass={0x24}, 0x24}}, 0x0) request_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440), &(0x7f0000000500)='-\x00', 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0xffffffffffffff4e) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) setns(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) keyctl$update(0x2, 0x0, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000940)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:24 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 22:02:24 executing program 5: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 22:02:25 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x2, &(0x7f00000002c0)={@rand_addr=0x1000000, @multicast1}, 0xc) [ 443.320698] audit_printk_skb: 30 callbacks suppressed [ 443.351991] audit: type=1400 audit(1537308145.437:649): avc: denied { create } for pid=11895 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 443.489783] audit: type=1400 audit(1537308145.607:650): avc: denied { write } for pid=11895 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 443.831623] audit: type=1400 audit(1537308145.947:651): avc: denied { read } for pid=11895 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0xfffffffffffffdce}, 0x28, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000300)='veth0_to_bridge\x00') r1 = getpid() recvfrom$unix(0xffffffffffffffff, &(0x7f0000000480)=""/230, 0xe6, 0x40000100, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x20, "eba0e8cc7c68f36f130eb86c038638a1d06b85437e0645a2c3834868916f046355fa5700d55aa84ffbd2deec32a483cbbdb5745dd4124b31bdeb97169f831f7b74871b46e931a1e6c96d837d27063900"}, 0xd8) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000340)=@req={0x200000000, 0x0, 0x0, 0x7ff}, 0x10) sched_setscheduler(r1, 0x5, &(0x7f0000000100)) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={{}, {0x0, 0x7530}}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000580)={0xb}, 0xb) 22:02:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000011ff0)=[{&(0x7f0000000180)="39000000130009006900000000000000ab008048030000004600010700000014190028007360db89e06455c4726e00000000000003f5000000", 0x39}], 0x1) 22:02:26 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000240)={0x0, &(0x7f0000000200)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x2bc, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000001c0)={0x0, @aes128, 0x0, "af3b5b07be2c8f65"}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f0000000040)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:02:26 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) listen(r0, 0x404) 22:02:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @loopback, 0x0, 0x4000000000000007}, 0x10) 22:02:26 executing program 1: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:26 executing program 2: chmod(&(0x7f00000002c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000180)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_execute_func(&(0x7f0000000040)="42805da00fef69dc0f01ee263a200986bdd4c9bdd4c941cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:02:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0xfb) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 22:02:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getcwd(&(0x7f0000000100)=""/7, 0x7) [ 444.940420] audit: type=1400 audit(1537308147.057:652): avc: denied { create } for pid=11929 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:27 executing program 3: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c00)={0x0, @loopback, @dev}, &(0x7f0000000c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@dev, @in=@local}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000940), 0xc, &(0x7f0000001080)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000005c0)="f5568055a07a7a69ef69dc00d990c841ff0fc4017b2d11c642651d69ca38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5dc422699ea9000000807f") socket$nl_netfilter(0x10, 0x3, 0xc) syz_execute_func(&(0x7f0000000400)="3e42d1e6f336d152322e36429866440f179b08000000f36f67410f71f7fff3400fb8ad0c36448d8f4978c3c4c4c3e94869a20ec403f1401836") 22:02:27 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000489000/0x4000)=nil, 0x4000, 0x0, 0x8013, r0, 0x0) 22:02:27 executing program 1: clock_gettime(0x0, &(0x7f0000000080)) nanosleep(&(0x7f0000000100), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000005c0)="f5568055a07a7a69ef69dc00d990c841ff0fc4017b2d11c642651d69ca38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5dc422699ea9000000807f") socket$nl_netfilter(0x10, 0x3, 0xc) syz_execute_func(&(0x7f0000000400)="3e42d1e6f336d152322e36429866440f179b08000000f36f67410f71f7fff3400fb8ad0c36448d8f4978c3c4c4c3e94869a20ec403f1401836") 22:02:27 executing program 5: getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000001280)='trusted.overlay.nlink\x00', &(0x7f00000012c0)={'U-', 0x4}, 0x28, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000002c0)) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getpid() socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000a80)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000ac0)='cgroup.type\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000001200)=""/84) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) gettid() fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e00)) eventfd(0x0) [ 445.608633] audit: type=1400 audit(1537308147.727:653): avc: denied { create } for pid=11951 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 445.700312] audit: type=1400 audit(1537308147.817:654): avc: denied { write } for pid=11951 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 445.785163] audit: type=1400 audit(1537308147.907:655): avc: denied { create } for pid=11952 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 445.792033] audit: type=1400 audit(1537308147.907:656): avc: denied { create } for pid=11951 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:02:28 executing program 4: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), 0x4) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:02:28 executing program 0: unshare(0x2000400) r0 = socket(0x40000000002, 0x3, 0x2) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 22:02:28 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:02:28 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000000000020481) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x4) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7}, 0x3e) 22:02:28 executing program 3: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) clock_getres(0x0, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:02:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0}, &(0x7f0000000e80)=0xc) setreuid(r1, 0x0) 22:02:29 executing program 0: clock_gettime(0x0, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0c3a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d3123b744dbe2440fc72326f00fbb9500000000") creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000140)=@req) readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') request_key(&(0x7f00000004c0)='logon\x00', &(0x7f0000000500), &(0x7f0000000540)='IPVS\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000340)='/dev/rtc0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000001680)={0x77359400}, &(0x7f0000001700)={&(0x7f00000016c0), 0x8}) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, 0x1}, 0x50) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) mount(&(0x7f0000000080)=@sg0='/dev/sg0\x00', &(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000003c0)='gfs2\x00', 0x0, &(0x7f0000000480)='group_id') write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x3}, 0x20) write$FUSE_INIT(r0, &(0x7f0000000500)={0x50, 0x0, 0x2, {0x7, 0x1b, 0x0, 0x0, 0x0, 0xd91, 0x9}}, 0x50) getdents(r1, &(0x7f0000000240)=""/185, 0xb9) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_STATFS(r0, &(0x7f0000000100)={0x60, 0x0, 0x4, {{0x0, 0x0, 0x1}}}, 0x60) 22:02:29 executing program 1: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:02:29 executing program 2: clock_getres(0x5, &(0x7f0000000280)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000140), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) socket$inet6(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") [ 447.480595] audit: type=1400 audit(1537308149.597:657): avc: denied { create } for pid=11992 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000680)=0xc) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) openat$random(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/urandom\x00', 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000d80)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file2\x00', &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in=@local, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001240)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xffffffffffffffb2) getgroups(0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001700)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f0000001800)) getpid() stat(&(0x7f0000001880)='./file1\x00', &(0x7f00000018c0)) getgroups(0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001980), &(0x7f00000019c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001a00)={{{@in=@dev, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001b40)) getuid() getgid() open$dir(&(0x7f0000001b80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getresuid(&(0x7f0000001ec0), &(0x7f0000001f00), &(0x7f0000001f40)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001f80)) getresgid(&(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000080)) gettid() getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getgroups(0x0, &(0x7f0000000140)) getpid() geteuid() getgid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000024c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f00000025c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002600)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000028c0), &(0x7f0000002900)=0xc) getgid() getpgrp(0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000002f80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42f98055a08e8e69ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e5430f0fa3be000000bf5d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 447.670864] audit: type=1326 audit(1537308149.787:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=11992 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf776ebe9 code=0x0 22:02:29 executing program 3: clock_gettime(0x9, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000900)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628a0fdf5af2c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") 22:02:31 executing program 4: keyctl$set_reqkey_keyring(0x4, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x28021) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 22:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="4c0000001400010000004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) 22:02:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0]) 22:02:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f00000000c0)=""/43, &(0x7f0000000380)=0x2b) 22:02:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)) 22:02:31 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000480)) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) getgroups(0x0, &(0x7f00000002c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000015c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3c4c29539744199c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:02:31 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:02:31 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x2b, 0x0) 22:02:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) sched_getscheduler(0x0) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) getpid() getpgrp(0xffffffffffffffff) getpgrp(0x0) getpid() sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000040)}, 0x0) syz_open_procfs(0x0, &(0x7f0000001640)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000002700)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001700)=""/4096) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_execute_func(&(0x7f0000001680)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:02:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r1, &(0x7f0000000300)="040105000500000000000000ffb25bc202938207d903378c398d5375c5f73f2e55067d2780e1", 0x26, 0x0, &(0x7f00000002c0)={0xa, 0x100200004305, 0x800000000000d, @mcast2}, 0x1c) 22:02:32 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x1006) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 22:02:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000002500)='./file0/bus\x00', 0x0) lchown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 22:02:32 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast1, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000e40)={0x10}, 0x10) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getgroups(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) [ 450.910373] audit_printk_skb: 3 callbacks suppressed [ 450.923296] audit: type=1400 audit(1537308153.027:660): avc: denied { create } for pid=12074 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 450.985538] audit: type=1400 audit(1537308153.107:661): avc: denied { write } for pid=12074 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 451.213621] audit: type=1400 audit(1537308153.337:662): avc: denied { read } for pid=12074 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="794cef301cc98f693090206d8a20f2420f584185397c2a0f0fcdc4a200f5bba44c24fa300f38212ef30f2d39c4837d39a95bb579abfa7ec3269426e0018f2898a25600b3c4a1d0567a242640df7dc89e6868c1f9f8011a1a01460f9cee45dfde8d") 22:02:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") shutdown(0xffffffffffffffff, 0x0) 22:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) pwritev(r0, &(0x7f0000002200), 0x0, 0x0) 22:02:34 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x10000000000003a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f0000000280), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xfc) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000001300), 0x1, 0x0) 22:02:34 executing program 5: syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) gettid() getpgid(0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000001600)=@newpolicy={0xfc, 0x13, 0xa01, 0x0, 0x0, {{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}}, [@tmpl={0x44, 0x5, [{{@in6, 0x0, 0x2b}}]}]}, 0xfc}, 0x8}, 0x0) 22:02:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) 22:02:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 22:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fcntl$dupfd(r0, 0x0, r0) 22:02:34 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x2) 22:02:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") socket$inet6(0xa, 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="980000000000000000cb00", 0x8) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) getpid() 22:02:34 executing program 2: umount2(&(0x7f00000006c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) listxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000740)=""/174, 0xae) sigaltstack(&(0x7f0000e00000/0x200000)=nil, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f00000006c0)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0xfdb7) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000001c0)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='tunl0\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) gettid() tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}}}, &(0x7f0000000700)=0xe8) getgid() lstat(&(0x7f0000000b00)='./file0/file0\x00', &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00)) geteuid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) 22:02:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x4, 0x0) 22:02:37 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, [], [{}, {0x9, 0x0, 0x398, 0x200, 0xfffffffffffffff9}]}) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x1000) 22:02:37 executing program 4: futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) 22:02:37 executing program 2: socketpair(0x2, 0x5, 0x5, &(0x7f0000000080)) 22:02:37 executing program 0: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip_vti0\x00'}) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0x0, 0x0, 0xb4) 22:02:37 executing program 5: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socketpair$inet6(0xa, 0xe, 0x0, &(0x7f0000000200)) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='security.SMACK64EXEC\x00', &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1e, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000003c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:37 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000180)=0xfffffffffffffffc, 0x3d) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000a00), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) [ 455.258521] audit: type=1400 audit(1537308157.377:663): avc: denied { create } for pid=12147 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 455.314018] audit: type=1400 audit(1537308157.437:664): avc: denied { write } for pid=12147 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 22:02:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x33}, 0xa, @in=@rand_addr, 0x0, 0x1}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000a40)}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @multicast2}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000008c0)}}], 0x2, 0x0) 22:02:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=""/138, 0x8a}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) 22:02:37 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() futex(&(0x7f000000cffc), 0xc, 0x4000000001, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) 22:02:38 executing program 0: memfd_create(&(0x7f0000000300)="675c2b7d6070703f0040de27ec5509e22d30bc4fb42769e62a56771c7f2636d236be1716b2d23f5068ba9bbfde535c162859a19275d2e84a050c6f3424efb51c9fe3d3bbd8e1a64d4eb936d722c4388c7372ad0bcbd48baf023f1ffe1def30c1c31b692c9279258686d44f6d569cb6e56895d7d88d790408ed221d8cfc7f87a6cd82d697", 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/227, 0xe3}, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000005c0)={@local, @mcast2}) ftruncate(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x387, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:38 executing program 1: clock_gettime(0x3, &(0x7f0000000540)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000005c0), &(0x7f0000000580)=0x68) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0), 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) syz_execute_func(&(0x7f00000003c0)="794cef301cc98f693090206d8a20f2420f584185397c2a0f0fcdc4a200f5bba44c24fa300f38212ef30f2d39c4837d39a95bb579abfa7ec3269426e0018f2898a25600b3c4a1d0567a242640df7dc89e6868c1f9f8011a1a01460f9cee45dfde8d") 22:02:39 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x3}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x930, 0x4) sendto$inet(r0, &(0x7f00000002c0)=' ', 0x1, 0x0, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) close(r0) 22:02:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@mcast2, 0x800, 0x0, 0x103, 0x2}, 0x20) 22:02:39 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) close(r0) 22:02:39 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x7) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000300)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:02:39 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000002c0)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{}, {0x77359400}}, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 22:02:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:02:39 executing program 5: clock_gettime(0x0, &(0x7f0000000200)) select(0x22a, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) getpid() inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000004180), 0x0, 0x0, &(0x7f0000004200)={0x2, 0x0, @local}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000700)={0x0, &(0x7f0000000580)}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@loopback, @dev}, &(0x7f0000000400)=0xc) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3, 0x1c) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000480)={'bpq0\x00', {0x2, 0x0, @dev}}) finit_module(0xffffffffffffffff, &(0x7f0000000140)='.\x00', 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) accept4$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @loopback}, &(0x7f0000000600)=0x10, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000380)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f0000000440)=0x1e) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000300)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:39 executing program 0: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:02:40 executing program 0: prctl$void(0x16) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:40 executing program 1: pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:40 executing program 3: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) utime(&(0x7f00000018c0)='./file0\x00', &(0x7f0000000480)) pipe2(&(0x7f0000001840), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in=@broadcast, @in6=@remote}}, {{@in6}}}, &(0x7f0000001a80)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001ac0)={0x0, 0x1, 0x6, @remote}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x0, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f00000003c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001b80)="42805da0bd0fef69dc0f01eece738c19fa380f3821c402f5ac10f0817e768cc80000000064660f5970fef00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") [ 459.032640] audit: type=1400 audit(1537308161.157:665): avc: denied { create } for pid=12220 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:41 executing program 5: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800)={0x2}, &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:43 executing program 4: clock_gettime(0x0, &(0x7f0000000040)) futex(&(0x7f0000000580), 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000140), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) clock_gettime(0x0, &(0x7f0000000400)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x2}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000200)={0x0, @remote, 0x0, 0x0, 'lc\x00'}, 0x2c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) sched_setattr(0x0, &(0x7f00000005c0), 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000000480)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000001c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'ipvs\x00'}, &(0x7f00000003c0)=0x1c) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:02:43 executing program 1: prctl$intptr(0x0, 0x0) prctl$void(0x0) request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0)='security,\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) keyctl$revoke(0x3, 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400), &(0x7f0000000580)) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f00000006c0)=0xe8) fcntl$getownex(r1, 0x10, &(0x7f0000000840)) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) fcntl$getown(r1, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)) gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001980)={{{@in=@remote, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000001a80)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xd6b63d9a) fcntl$getownex(r0, 0x10, &(0x7f0000001b40)) getresuid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) getgroups(0x1, &(0x7f0000001c40)=[0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001c80)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getgid() syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:43 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000006c0)=""/92, 0x5c, 0x0, &(0x7f0000000740)={0xa, 0x0, 0x0, @remote}, 0x1c) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 22:02:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 22:02:43 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r1, 0x4, 0x2000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x28ff21) 22:02:43 executing program 2: setfsuid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:02:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x29}}, {{@in=@rand_addr, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 22:02:43 executing program 5: lgetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@random={'os2.', "68d903dad7726c"}, &(0x7f0000000680)=""/246, 0xf6) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(r0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00\x00\x00\x00\x00!\x00', &(0x7f0000000240)=@ethtool_drvinfo={0x3, "cdad43542f7c0bb47e10ee0051628520042e2893a7295da8d0bd57f733438b55", "fe179afd0eda5c131ba5bd6394c1a7a0bb28293a07d927982f30e4acb3489cee", "720267e4762bb6031439bed846ead4622e291c8291e43260569b20cb639bd0d6", "7f671b90362a24ee4fb5a88d449e3acf49b2023eb4e51fb29163d325ae32828b", "e5ca687464273ec96cc5c0bce2a63dfe4175c631154277d32853b60def730df1", "c15ca7a6e1daf58dabe1c160"}}) 22:02:44 executing program 3: prctl$void(0x15) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/31, 0x1f, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000002c0)="42805da0ad5252ef84dc0f01eece67f3406e660c54f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getrlimit(0x0, &(0x7f0000000040)) 22:02:44 executing program 2: getpid() getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) syz_emit_ethernet(0x2c, &(0x7f0000000280)={@local, @local, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@broadcast, @current}, {@broadcast, @random="cbe749897d69"}}}}}, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000140)={0x20000000000001cf}) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f0000000540)) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000440), &(0x7f0000000540), 0x0, 0xfffffffffffffffb) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000040), 0x0) mprotect(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) getitimer(0x0, &(0x7f0000000000)) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f00000002c0), 0x0) get_thread_area(&(0x7f00000001c0)) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@multicast1, @multicast2, @rand_addr}, &(0x7f0000000580)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) 22:02:44 executing program 0: stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000500)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000080)) 22:02:46 executing program 5: unshare(0x2000000) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) dup(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) shutdown(0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@random={'btrfs.', '.request_key_auth\x00'}, &(0x7f0000000380)='.request_key_auth\x00', 0x12, 0x0) chdir(&(0x7f0000000440)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300), &(0x7f0000000400)='rxrpc_s\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d07772e1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a4131a3b744dbe271fb0f4fb500088041") mknod$loop(&(0x7f0000000780)='./file1\x00', 0x0, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000001880)) clock_gettime(0x0, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}}, &(0x7f0000000180)) ustat(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000005c40), &(0x7f0000001940)=0x3) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000700)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000005c0)}}}) 22:02:46 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000580)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f00000000c0)=""/34) ptrace(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") prctl$getname(0x10, &(0x7f0000000940)=""/219) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x88) keyctl$set_reqkey_keyring(0x11, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[]) 22:02:46 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), 0xc) bind$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @local}, 0x10) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)) sendmmsg(0xffffffffffffffff, &(0x7f0000003880), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)="6e6574a6c5f60ef5be2919fe694a324ca617e92f736e6d703600") syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:02:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0)=0xfff, 0x4) 22:02:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x101, 0x3ff, 0x0, 0x0, 0x1, 0x0, "469af97b1d8afaca273af565b9aef17be76cfc34d2fd571f86bf35562655788e9c872d309d80515b2232dd8bfe0f6a59a9198e78fe7f6dc87baf8efa3f4127ce", "1540e02c8112b778a61aaba2d62b6a50ce1d1be9d15794da4b96aa6a4c46f6f241deb367d81d594c41ab91fe6a2be4df012e7d84376efd4c733f306dda900e34", "4ade5836edfeebf002c087fe8d14bf02b41f9e7c4403836b9f69246b3a8f6293"}) 22:02:46 executing program 1: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) getgroups(0x0, &(0x7f0000000180)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0}, 0xa0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) memfd_create(&(0x7f0000000200)='/dev/hwrng\x00', 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getuid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@mcast1}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)={@local}, &(0x7f0000000740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000a00)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000a80)=0x14, 0x0) 22:02:46 executing program 2: getpgrp(0x0) syslog(0x0, &(0x7f0000000e00)=""/177, 0x485) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000dc0)='./file1\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xc) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getegid() socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x0, @dev}}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/null\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000f40)=ANY=[], 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) geteuid() ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) syz_execute_func(&(0x7f0000000700)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 464.751761] audit: type=1326 audit(1537308166.867:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12331 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf777fbe9 code=0x0 22:02:47 executing program 3: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000400)) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) 22:02:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439efc53decf2f7ea39101d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, [], [{0xfffffffffffffffe}]}) 22:02:47 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3}}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000200)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) 22:02:48 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000004c0), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000580)) [ 466.132291] audit: type=1400 audit(1537308168.197:667): avc: denied { create } for pid=12359 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:48 executing program 1: getitimer(0x2, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:02:48 executing program 5: r0 = memfd_create(&(0x7f0000000200)="00eb000000000000", 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 466.343775] audit: type=1400 audit(1537308168.467:668): avc: denied { write } for pid=12359 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 466.717018] audit: type=1400 audit(1537308168.837:669): avc: denied { read } for pid=12359 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:49 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@empty=[0x2b, 0x806000000000000], @random="1b207f5c5eeb", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x29, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x8100, 0x2c}}}}}}, &(0x7f0000000000)) 22:02:49 executing program 3: clock_nanosleep(0xffc99a3a, 0x0, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:02:49 executing program 2: io_setup(0x9, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) 22:02:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000001140)={'ip6tnl0\x00', @ifru_flags}) 22:02:49 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000780)) quotactl(0x0, &(0x7f0000000340)='./file0/file0\x00', 0x0, &(0x7f0000000600)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:02:49 executing program 1: clock_gettime(0x0, &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000d40)="42805da0bf0fef69dc644f17c4a13dc6aaff00000000710000ce0ec4e2653970003805de660f3825cf260f4fb641000000a33d062900770f78990ec33d674141b1d8c7460f72f7a4440f93b80800000044fe80cc39390fc403d9427b9c0065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:02:50 executing program 5: getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 468.039214] audit: type=1400 audit(1537308170.157:670): avc: denied { create } for pid=12405 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 468.214647] audit: type=1400 audit(1537308170.327:671): avc: denied { write } for pid=12405 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 468.483056] audit: type=1400 audit(1537308170.607:672): avc: denied { create } for pid=12415 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 468.635846] audit: type=1400 audit(1537308170.757:673): avc: denied { read } for pid=12405 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 468.679688] audit: type=1400 audit(1537308170.797:674): avc: denied { write } for pid=12415 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:50 executing program 3: prctl$void(0x0) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000880)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) getgid() getegid() getgroups(0x4000000000000184, &(0x7f0000000080)) lstat(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e40)=ANY=[], 0x0, 0x0) keyctl$set_reqkey_keyring(0x14, 0x0) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)={0x2, 0x11, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}]}, 0x38}}, 0x0) 22:02:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f00000005c0)=@newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_DST_IPV4={0x8}]}, 0x24}}, 0x0) 22:02:51 executing program 2: setrlimit(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@ethernet={0x0, @random}, &(0x7f0000000780)=0x80) setxattr(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000340)=ANY=[], &(0x7f0000000580)='numa_maps\x00', 0xa, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:02:51 executing program 5: getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 469.977502] audit_printk_skb: 15 callbacks suppressed [ 469.992088] audit: type=1400 audit(1537308172.097:680): avc: denied { create } for pid=12446 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 470.113050] audit: type=1400 audit(1537308172.237:681): avc: denied { write } for pid=12446 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 470.457744] audit: type=1400 audit(1537308172.577:682): avc: denied { read } for pid=12446 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:53 executing program 2: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:02:53 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getgroups(0x0, &(0x7f0000000140)) accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000500)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5416a45c462010d42002e660fe09500000000660f758233949cddee31a3b786e29885c4227992dd289f9f") 22:02:53 executing program 0: timer_create(0x2, &(0x7f0000000200)={0x0, 0x22}, &(0x7f0000000240)) timer_gettime(0x0, &(0x7f00000003c0)) 22:02:53 executing program 4: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000040)=0xfffffffffffffe42, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:53 executing program 1: clock_gettime(0xb, &(0x7f0000000300)) pipe(&(0x7f0000000d40)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:02:53 executing program 5: lsetxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000140)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@rand_addr}}, 0x44) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0xffffffffffffff17) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000200)='illinois\x00', 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001740)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000640)=0xe8) getresgid(&(0x7f0000000680), &(0x7f0000001840), &(0x7f0000001880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000018c0), &(0x7f0000001900)=0xc) getgid() stat(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)) fstat(0xffffffffffffffff, &(0x7f0000001a00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a80)={{{@in6, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001b80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007240), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getgroups(0x0, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[]}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local, 'irlan0\x00'}}, 0x80) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:02:53 executing program 0: mount(&(0x7f000000a000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/74) 22:02:53 executing program 3: getegid() ustat(0x0, &(0x7f0000000680)) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000700)={'U-', 0x3}, 0x28, 0x0) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0xffffffffffffff0b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8d000/0x8000)=nil, 0x8000, 0x1000, 0x0, &(0x7f0000d8f000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003740)={{{@in6=@mcast1, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000003840)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000038c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003bc0)=0x14) getsockname$packet(r0, &(0x7f0000003cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000003e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003fc0)={{{@in, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000040c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000041c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004340)={0x0, @multicast1, @multicast2}, &(0x7f00000004c0)=0xfffffffffffffee5) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000043c0), &(0x7f0000004400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004440)={@dev}, &(0x7f0000004480)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@mcast2}, &(0x7f0000004500)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004ec0)={0x0, @rand_addr, @multicast2}, &(0x7f0000004f00)=0xc) accept4$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f80)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004fc0)={@loopback}, &(0x7f0000005000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005880)={&(0x7f00000003c0), 0xc, &(0x7f0000005840)={&(0x7f0000005040)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000a40)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 471.495127] audit: type=1400 audit(1537308173.617:683): avc: denied { create } for pid=12467 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:53 executing program 5: clock_getres(0x0, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) chown(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast2}}}, &(0x7f0000000240)=0xe8) getuid() ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000e40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast1, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000000c0)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000140)) getgroups(0x0, &(0x7f0000000940)) request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f00000008c0), &(0x7f0000000900)='$eth1wlan1cgroupeth0/\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f0000000bc0)='keyring\x00', &(0x7f0000000c00), 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000940)='user\x00', &(0x7f0000000b80), 0x0) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getegid() ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000c80)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:02:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) write(r0, &(0x7f0000000040)="220000002000070700be0000090007010a00001e00003c0000ff040405000c008000", 0x22) 22:02:54 executing program 1: prctl$getreaper(0x2a, &(0x7f0000000300)) 22:02:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01eece41ff0f18370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000003c0)=0x1c, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000200)=@known='security.SMACK64\x00') request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000280), &(0x7f0000000240)='rxrpc\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000000c0)={0x0, @aes256, 0x0, "a777689a16c6fbf4"}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d9690f0d76ddc841ff0f1837c4c3397c2a060f38211abfe0a5a59086d9f28fc9410feefae5e5417545bf152e1a1a010d64ac1e5d31a3b786e2989f8f89a0946a00") 22:02:54 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x10044}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) [ 473.123728] audit: type=1400 audit(1537308175.247:684): avc: denied { create } for pid=12479 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:56 executing program 4: getrusage(0xfffffffffffffffc, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x1ffffffffffffe7a}) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:02:56 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x0, 0x0, &(0x7f0000000040)) 22:02:56 executing program 2: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) unshare(0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) dup(0xffffffffffffffff) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000440)=0x1c) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x5e4, &(0x7f0000000080)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'nat\x00', 0x2, [{}, {}]}, 0x48) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000004c0)=0x1c) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:56 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x3, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}}, 0x8c) 22:02:56 executing program 5: syz_emit_ethernet(0x82, &(0x7f0000000340)={@remote, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ae575a", 0x4c, 0x0, 0x0, @mcast2, @mcast1, {[@fragment={0x2f}], @gre}}}}}, &(0x7f0000000080)) 22:02:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="0a5cc80700315f85715070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") fchown(r3, r1, r2) 22:02:56 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001dc0)) getuid() getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) getegid() stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) lstat(&(0x7f0000003500)='./file0\x00', &(0x7f0000003540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000035c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getresgid(&(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000037c0)={{{@in=@local, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000038c0)=0xe8) getgroups(0x0, &(0x7f0000003900)) getuid() stat(&(0x7f0000003940)='./file0\x00', &(0x7f0000003980)) fstat(0xffffffffffffffff, &(0x7f0000003a00)) getgroups(0x0, &(0x7f0000003a80)) getresuid(&(0x7f0000003e80), &(0x7f0000003ec0), &(0x7f0000003f00)) getresgid(&(0x7f0000003f40), &(0x7f0000003f80), &(0x7f0000003fc0)) fstat(0xffffffffffffffff, &(0x7f0000004a80)) lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004bc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000004cc0)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d00)={{{@in=@multicast1, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f0000004e00)=0xe8) stat(&(0x7f0000004e40)='./file0/file0\x00', &(0x7f0000004e80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000004f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000000040), 0xffffffffffffffff, &(0x7f00000001c0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001fc0)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000020c0)=0xe8) stat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000021c0)) getegid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b21793e26f043108900000000c4011bd030f5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 474.640513] audit: type=1400 audit(1537308176.757:685): avc: denied { create } for pid=12525 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:56 executing program 1: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:02:56 executing program 5: syz_emit_ethernet(0x108e, &(0x7f0000000d00)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv6={0x86dd, {0x0, 0x6, "76a6dd", 0x1058, 0x0, 0x0, @local, @local, {[@dstopts={0x0, 0x3, [], [@ra={0x5, 0x2, 0x6}, @calipso={0x7, 0x10, {0x0, 0x2, 0x0, 0x0, [0x0]}}, @pad1, @pad1, @pad1]}], @icmpv6=@time_exceed={0x3, 0x1, 0x0, 0x7, [], {0x3f, 0x6, "0325c8", 0xe28, 0x6, 0xec1f, @local, @remote, [], "b6b8f06b9aec5db62969569842af69548a7d118f40e2d9e06248b9bb0c335a1973a1d1db1f81156f1dc1d3be12a79022ba6e7b03ea435ec638c6b5428c18e60cadc81bb7bd012b063b47cbe5c9b17b8beaa64b17f4f16fcff277a4453e8f9ee64dd69da85f15af80eff966c62a75cc23ed6eaecd0e250dbec6f3f22395dfb21a1508247f307ccaae6bdb6bdac5c376cf4ad61948169d039eb2c6b7c0a18fac8dbb268bf94cc576f14df4dd62eee50f38828ce355ae7cc2a98f6da55570f8c2c119ab471eda22c104dd067cb2ed3869bf5b15587f45ffcc8ae5576f15d32eacc0dae1f99baad357eabdfd86e14f1f3cc4b192d5663cd2366d946f56279de0f87f1ba6582338ec19d8d12f78e2ebf77962c284f6c4a6286f2a7894102552f9ac79760cf938fba485889caec302d465edeee4987e9c00989c43df7b02e8307e972a8da1a7d402b164cb2671f444f74f66fa1e03716e895ddf0a0e87b14f5b23b42dff3f0624a606d8ede6d31cfa6fae71d08a7bb022743c53cd1e78b91b3c12b20b30e151faaff40decf3752349d1a1841de7fa6d3e5f0922ef39b6a8cc76b0839c1b5d740a4bed245408fc45e50d8673784dff90be6a40f16f9edf82c470a37529b386ee2f07727b8ee6b9d7bd4b327cdc90cddace7b161f3321c57c7da25193d4a554671665389278cbf878712c55781958442198901d07c04d6c224b7bc9a6a25b098591d8fa95950592311403fa1c9cc8b6bd31103bc7f9dcf6f747144d0af0403c3f0a6291fbcf65d4c03d536b00b7fc99348d193f84cc92d9bd95cfd73daaaa7ff493c32b2ec274d3d81a60b998d92931f54235b6b045507986b30992b51db20e6e0c5ae7130974641ff4ffc4773fab11ce470680e63b359f8e292ec9c7e5725c56d0a48aab718ef137ccc3cc346d7aabe53b3d0ebb45b2a8b7b062b7ad31e503b22b408b0f5d37059b717df13c6d43667469fcbabd17cbac418474ab6cc04feba7efd319c0e06804a5ac3a3dc763976254fd5514314182d9dc6d9dfd4c91e5b54d0b4a46c48a0f8d9f41411821ddabbf9c7eb468d6443e83b81a00d8e33340e43e6d5d070f55b52bcf11308a02292f3f5f330e9aa42502aae7a20cc6bc364810d59853d13fa5ff58a9e5807d0c660699bc850a2f1ce027d5ea946b002cdb98f534de61712a41ca19bb0cb40b9bee3d7fe53165fa98c232cbfb76fa5838b37f81542e2e4f8e8274c85c72aa82f578a2a9d31534ca118c9d848a71edac3eee4ba449caeb8c0883e9f9a2638e1bb8ac7ef1f9566840ce8bed91da674a5bf7c20e2280e7eda2d9e1b7a7edaf00c8b2cb3557713b8820961ee5e954f694321f3bad498a1b6fd4a8a4eae8a7b032e67cf73bff0e1c2b27e6df592220e1bfec48f744e95c03f2620024b7a623ad0e211b348c52f4ac146c36fe40b75916f2c4b53c3b20cae76cd8bdde408468c5a073503133d0a3a8ad4f77ae3437ef40b4a6b4b6b01e6e67a68a298adfda6833d489a24d0422de50ae7205616a7bd54b361352b1ba6db022bd9ca7e7d89f4616eae319851fba8ec5fc683278aeec6436d65baef7f8c311be2cfb8f9d5464dffe7116f501693db36569f6486a796c0f70bfb57335b4e1b336a62f9977615dc1dddded633a877f32620a70599b5da68f713accc6622b7384bd829603435ec5ab3a20e23420f30364b69d9de7295b3e5af641b5e665daa363cc229c290a8204dd54ba0c71ca4c7b90919b560fdd437812d67af9cbee5492cfb2a7d79975d090efe3aef459c2a32a249a11ada8b3cd6e578565bb5201373f7e343724ca6d03dc29d7072e32f8a3af89c6a22af0898b8208dc710d349f1cdbbf77c26e2fdfb3d9e42a7d7c0a4b18041bc37bd7cbab64bb470531211b8802512d289673fd14ef0abd176457f1fd7157ec648b94e1e66b91ba47eecd1759695e27eccd0cbee7a47dfd95c1d984dd3657f62059d02192483c06ecc52d4c3d113ed60637a99c47c222528feecc1b7acf7167bd65c210c04c4bf12ddd09c9fb30bc5e94d334b123b418b3437dd6ba04e211a4e9b71a59350e593ca5935996b4a2483293052c205cf2b7b00579372d880eadb897963328c68f0c76ca00f8fbbc6f96467c1da4daf9d6e6dca0f232a64adf4de938f275628606aaf83a3fa5b668e52311123cea8f5f5aba1d574d18878758a87a0654cd42af5657d2be09266adf422dcbf89b4aceda7233333bc3ee056f9f2af8eb9ea84d8802d3baa317c6744e3474080d267cfb8352876956274c55a7daf6fd4295cc713ecc4820afdc19942d1d3b3f593d4873226ad3575bba3ffe4b290c06d53b44baf21f93bdb23c758f34fba4bf9caa825b006db16fda75687a5060ef8e84793c0a06c3986d88a3407dd6e87f93245a0daae8609261db11f78ee8b6be825afc05ad600f194f899f2bcdb3c7f3cfd0e546b7ae99ed58adbc895afff156ae9b894d9699c9022870baed6de26ac2e45fc730aa8a2351ea54b86332833ca2f850ec7740379f6557166cb994d1bd640a6bcff6b8c04cb1e5181d73c6aa6c49d9afaf2414ea9db4b15f0d347d622bbb749da37ed8c5b434ac8dca7bf1b75bd3bf674fab271253840aae358fdc59016edd9fc3371d1e18f1b7689771881778590e19bbce2fc9f2a90ccf117a4d8de7582b35676039741af52028de0e1237dca602e1832dd1ffa573b0c869eede1a27e983c8446a236dcb03be3b2e46c1a73917683a74762ebfbbb5b7a0fc90f07ca28e1824f87651fa1181b0d2e0953def2ed4e41eb83cf415791ad94fa92950f846ddaa4f67baed51de0daf11632309030bbd1428a006d900eaa0d91dda09c76c3ec75ce544259559bb1b92163cd6673c53d1804922d7f0f7d5157ec85d815f623f9a36cc849e9af55053a9d4ec27bd76e3614ec185282bc61a88567972b32769f39edcdedcd08007a24eb92a963bbd8c10e4520bd1cc4467d12bffac85c638604da14fdd0c2aa4fef82f25fce0dbd9bca6eaa6d01525bd24c9112bf60e4dd96e3a8a6b4b044a2d8a8310005ae79902a536615f8003a90f90ccecb3294f48ee5464a89f9d2b51074332d8ae73b66e5e7d4520d5227192f3264186a7d501a295f51c41248eb76ff98147240bdeed5238ca739fd0aef16ab41d4332318ceb74c25b2a6d2d21662b5e5fe9d075948ea7747a044db3e59321ad0ce59cbfeb87f25805a8ca5abeabfb0646b15a7b4e85555a275ccd4cd5224f2c58f229a33656baad4fbce6f6db57ccc0518937f18fbfec6a1521c2f532d132ffa90fa0dd4800bada846ab23233083dd6c5b472361202ccb319bfa139662c73694909cbbe7417031d274ff4441a3b7c5668b9bc7fb810b849740345f13c544c6144644f4692b575ad9620b15575c6cee609d5ae29486ad4f746b7143a1b6f1935cb3e346f0e8f65fb2d61abfe03fedb6fc4c5797a7da540004a27240fef4853635ac83d86e30393c760ec22c0985a8fb00b17f8ef3e468aba0e4f2b5be05ce739eb2a54f41d583adf1f239fd5370e2bdfce12635a0f9afdab9f012d4eb14e382a03d29999de836dc29c648815f750b78f7810a3d7ed31489a921c1005ce34dabbc2fb68fb77de75d1fcb674f2454b73493ddaa2fb83cb94a9db24a005ae174be2396c63879ab810e4b1f3cb115cedbe84ddb6beb1406c09bde5427edbd33ae13dc1668d90111bca39f1e01b877e8cc1cc25649be1fb4b7f4071f9d03d66f12c732c7d3784dd396f1b890f391176dbee42b2970d2432b973ec90f86e72db9df29401922b279cfc923deae494f216ebef20d819f85f06494cf20b12b4b6cfcf424340efc425ff44dda14deb77011b19ed525b8aed3967bfdc4f6e4b92f3d5bd17b3791c43effd8c20f8f499bb76602a8a71bcfb2baedcb65ae01580831fd8e11ebcacbbc68da95889521047a1ca7a02567c5ddc810d504de2eb07bc39aa878943ddd0feb779d890c73eb6d3419ebc3e2d5b02e70746e9c91640459c8622e3af00918c6f0b2ee7f88eefd44952c26bda76aacc0ae1f816412d8be9fea7b1a47e9acb697976aa3832c50f65b09d3d87cf4128ee1ce1dc156676f195be2df1a9cdb81abf4f08d138b5f8cffc58efab9433b17dfd636ec744c9a4853d4b056ce3a9da985152745625ed94f857432ba27b1874b74973c83e2a69afabfc8c1efa1e8a55392aa3d86d760a6773420057cef24b26aafcfc6f7c35b88d51a493ddb456677a31b6abd07fefdd6c736f20a107b9a3a4218827468c59d18466b008d3d6e57a5f56aff16b393d41b28842c07f861eb450e28125354432ea58d37a34569013ce66b1449a636510e31542d72a7cd104163a4ff4c9eef6bf624ad58de22f21fba377198657db249f24a93564e571be300e8fcea4efca1ac9e5a32ef001980311a4057a7c65a4c07b8403c9ef71149e025b0e13dc0d5063dc81cd572b75b56c71628a0324571858ba8b3872a709b0723d1d16f6f4624a8c9dcc5fd4f39d5d9ec3e016ebe960eb087f54ae5679095c625aa22db84f1003b4c32faa7a3bd61ffedc5d55361dd604d95af4a2a08c18139c87df577a9dc585d3b8f64ad96d123ebdc01ebf522834814cb6a5d41661dda4548f44aa2dc8c4cf033963cafd6bde937ca5ab38a5b4b44fe388ec0f6f4a44fbeac2d59a386fa85071838a34be9bf6774f5561f891d2464a35880f8ba5bff13672a90020c13b32d4cb24ed32848e6a1d528f1cc9b36c38b9eb83df5a3f6e49598f4c86143414b106b8dafa04beb6e7054aa04eca3b8a6a7d74735337b47691cc120667206357fe73f40d5d6f0b86281c9c284638de12938629f4a3bf842a6c1471ab9fbe8deb2b9e0122d1cb7d0e2e2c93223dafa366ff9031842cbb341d4660c9793a8ae2f6cb58014aaddf975520bb01e0f46d9731c5ba3ce7883e102ad813a6cd1d854452ffb2193fd0e6375fba09bd6940f916c9a697bd89b1c547315cbed3f1729cbcb696fbc5155b2b1161664a88fd6addfb7f3d1bf4f0ce5b214097800e941a6381197df37a4c37980cfb693f1a74170ec4db4715c77beafd76bef2c4699a7c0cf58e41c380ee156130389ca68cda2431d66d0cb2c4a89160a2a42f72d7f5343e52dbb3c412bd07450a48421f3e09acdcc4257feb43f98c82467f356d23fff1314c60bfaeaf5ecb26b2e9cd22dfe06c1865feba6384d723a0473602fa21b262952da8008a468b3f784d665a8e101522b944e4c7503e25cb06306380ed5ca2b10b5393311a5a17285bac35b64a716d7fb407489b8cd4854d77ce0969bfbd5cee0849a4822997beb5e06985df4585085821aa9c6b586da577428e40102d46da8037ee781432348ae885b9e48ffb81b3085e861da19f7b19c4b1a41abec8a42a2a222c0b83f1de249b4896f760955d6bea5081581d574d6feed824240f05c6f9cb92ac8a601bcdbdc5c36b89fcb0848859cf3429108d7a25c22bc20eddf035d18451fa9a3c0feb27728ecc8137ab17822dd9f3062b964cffcd76904f432ce114a4e44b6c76f16ece2e4a1e3df684c384f8830392abf536beea71e6a41f3fcce0012e5497d38587710aa72eb253548a3d7c16026561ec0d25e67ee797bfe9da962957cdf6ea7f2a382a8abd1768ca8eab6ded96bd10a58dae4eddd13e02c850d88ee20b05bb8f9a31f559fdf72505e70395cd1add2bab1d3a7e390bd69a51f025c6e60dd63a6c7a3e70f551bd6da34f8489249ded0946b761451ca3ff455874bb3dea545275a3e928f95b06c4d5bfa99998c154f1c6c0d96762ab736f"}}}}}}}, 0x0) [ 474.734854] audit: type=1400 audit(1537308176.857:686): avc: denied { write } for pid=12525 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:56 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") [ 474.899777] audit: type=1326 audit(1537308177.017:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12525 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf77cbbe9 code=0x0 [ 475.123804] audit: type=1400 audit(1537308177.247:688): avc: denied { read } for pid=12525 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:57 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xfffffffffffffdc2}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000380)=""/152, 0x98}], 0x2, &(0x7f0000001040)=""/4096, 0x1000}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000780)=""/229, 0xe5}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bdff0f0000000000001400790000000800120014286fd776234076c84797fe5e54c2cc03000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000600000400000000000000000000000000000000000004000400170000001f000000000700003f000000000000000300000000001200"], 0x88}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 22:02:57 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000380)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000480)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$set_reqkey_keyring(0xe, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 475.475883] audit: type=1400 audit(1537308177.587:689): avc: denied { create } for pid=12525 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:02:59 executing program 4: lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.SMACK64\x00') getgid() seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f45022e") 22:02:59 executing program 1: setrlimit(0x0, &(0x7f00000007c0)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000006c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) rt_sigreturn() 22:02:59 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000300)=[&(0x7f0000000080)='/\x00', &(0x7f0000000180)='%eth1(\x00'], &(0x7f00000003c0), 0x1000) 22:02:59 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000080)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:59 executing program 3: clock_gettime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getresuid(&(0x7f0000000500), &(0x7f0000000700), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f0000000880)=0xc) getgid() lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@mcast2, @in=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000d00)={0x10}, 0x10) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) clock_getres(0x0, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 22:02:59 executing program 5: stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000500)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'\x00', {0x2, 0x0, @multicast1}}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:59 executing program 0: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0xfffffffffffffc01}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}, &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:02:59 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), &(0x7f0000000180)=0x212) 22:02:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000281, 0x0) 22:02:59 executing program 3: r0 = socket(0x11, 0x8080a, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 22:03:00 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='maps\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 22:03:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x0, @loopback}}) 22:03:01 executing program 4: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @loopback}, &(0x7f0000000300)=0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) nanosleep(&(0x7f0000000040), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) chown(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") fcntl$getown(0xffffffffffffffff, 0x9) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000340), 0x10) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000003c0)}) 22:03:01 executing program 0: clock_getres(0x0, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42804da03e0fef69dc0f01eeced0193e67f30f103ca8380f38211af3f0817e768cc8000000000fd9595df00fbab204000000ca6b2979dae5e54175450f2e1ac4010d64ac1e5d31a3b74473e271fb0703") 22:03:01 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$join(0x1, &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x2}) request_key(&(0x7f0000000ac0)='cifs.idmap\x00', &(0x7f0000000b00), &(0x7f0000000b40)=')selfself\x00', r0) 22:03:01 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 22:03:01 executing program 3: timer_create(0x0, &(0x7f0000000200)={0x0, 0x2b, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000300)}}, &(0x7f0000000240)) timer_create(0x0, &(0x7f00000003c0), &(0x7f0000000400)) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000580), &(0x7f0000000440)}}, &(0x7f0000000680)) timer_create(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, @thr={&(0x7f00000006c0), &(0x7f00000007c0)}}, &(0x7f00000008c0)) timer_gettime(0x0, &(0x7f0000000940)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getpid() ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0c3a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d3123b744dbe2440fc72326f00fbb9500000000") 22:03:01 executing program 5: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe7}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") keyctl$join(0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:03:02 executing program 1: getrusage(0x0, &(0x7f0000000240)) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x1c9c380}}, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:03:02 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000900), 0x0, 0x20000800, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00006fd000)="c3", 0x1, 0x0, &(0x7f0000e66000)={0x2, 0x0, @rand_addr}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendto$inet(r0, &(0x7f0000000140)="e7", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 22:03:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000040)=0x7ff, 0x4) 22:03:02 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, r0, 0x0) 22:03:02 executing program 0: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800)={0x2}, &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) dup(0xffffffffffffffff) fdatasync(0xffffffffffffffff) request_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f0000000300), &(0x7f0000000380)='\x00', 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200), &(0x7f0000000240)='em0cgroup\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:03:02 executing program 5: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") close(r0) recvmmsg(r1, &(0x7f0000000200)=[{{&(0x7f0000000000)=@rc, 0x80, &(0x7f0000003440)=[{&(0x7f0000002440)=""/4096, 0x1000}], 0x1, &(0x7f00000034c0)=""/59, 0x3b}}], 0x1, 0x60, &(0x7f0000005d40)) 22:03:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000000), &(0x7f0000000200)=0x145) 22:03:05 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) lseek(r0, 0xfffffffffffffffe, 0x3) 22:03:05 executing program 3: clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 22:03:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)="6263736630000000000000001100") 22:03:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000180)) 22:03:05 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000500), 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 22:03:05 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000640), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000340)) eventfd(0x0) getuid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)) geteuid() getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) utime(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f0000000580)) getegid() getegid() getgroups(0x0, &(0x7f0000000600)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000280)='./file0\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/72, 0x48, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000500)) pselect6(0x40, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0), &(0x7f00000006c0), &(0x7f0000000740)={&(0x7f0000000700), 0x8}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:03:05 executing program 5: getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:03:05 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, &(0x7f0000000080)={@mcast2, 0x0, 0x0, 0x2}, 0x20) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@rand_addr, @remote}, 0xc) [ 483.387492] audit: type=1400 audit(1537308185.507:690): avc: denied { create } for pid=12696 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 483.538287] audit: type=1400 audit(1537308185.657:691): avc: denied { create } for pid=12696 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 483.583921] audit: type=1400 audit(1537308185.707:692): avc: denied { ioctl } for pid=12696 comm="syz-executor2" path="socket:[39995]" dev="sockfs" ino=39995 ioctlcmd=89a0 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 483.596683] audit: type=1400 audit(1537308185.707:693): avc: denied { ioctl } for pid=12696 comm="syz-executor2" path="socket:[39995]" dev="sockfs" ino=39995 ioctlcmd=89a1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) 22:03:06 executing program 3: mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) [ 484.536835] audit: type=1326 audit(1537308186.657:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12723 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf77cbbe9 code=0x0 22:03:06 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f00000000c0)={0x1}) close(r0) 22:03:07 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) close(r2) 22:03:07 executing program 3: vmsplice(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_tables_names\x00') write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:07 executing program 2: getpid() syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)={0x77359400}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x0, {}, 'veth1_to_team\x00'}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000200)='net/ip6_flowlabel\x00', 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) add_key(&(0x7f0000000500)='.dead\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000b00)) fcntl$getown(0xffffffffffffffff, 0x9) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000d80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001740), &(0x7f0000001780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000018c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001980), &(0x7f00000019c0)=0xc) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}}}, &(0x7f0000001b00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000001c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) stat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) getgroups(0x0, &(0x7f0000002440)) getresuid(&(0x7f00000024c0), &(0x7f0000002500), &(0x7f0000002540)) getresgid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getresuid(&(0x7f00000028c0), &(0x7f0000002900), &(0x7f0000002940)) fstat(0xffffffffffffffff, &(0x7f0000002980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002e40)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000002f40)=0xe8) getgroups(0x0, &(0x7f0000002f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:03:07 executing program 1: clock_gettime(0xd9012b20d797d5a0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:03:07 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)="2583c22c986880244a5ea3dbf7222feaca4c9462487c7183b3d01c91367d750a75bc313180a4bd14bfcdf7e438794aef92a26c78ae87f30bf29a684dfa70114d7f6b0ba49b6b46c15893be5f0039b1b24be6a6b4fc3bf0d319c7a5814c66b814632abd5235ccce47b7b915217a141b969be604e1d49253d50053a27b85") sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) bind$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da053cbcbef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac5f6070364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 22:03:07 executing program 0: ioprio_set$uid(0x0, 0x0, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000340)) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") [ 485.594109] audit: type=1400 audit(1537308187.707:695): avc: denied { create } for pid=12745 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 485.733041] audit: type=1400 audit(1537308187.857:696): avc: denied { write } for pid=12745 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 485.787862] audit: type=1400 audit(1537308187.907:697): avc: denied { create } for pid=12748 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000400)={0x2, 0x0, @remote}, 0x10) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x30, &(0x7f0000001700)={'raw\x00'}, &(0x7f0000001780)=0x54) 22:03:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xffdffffffffffffe, &(0x7f0000000000)) 22:03:08 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000000)) socketpair(0x2c, 0x3, 0x0, &(0x7f0000000040)) sched_setscheduler(0x0, 0x0, &(0x7f0000000180)) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) 22:03:08 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000740)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@broadcast}}, &(0x7f00000008c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) syz_open_procfs(0x0, &(0x7f0000001100)='net/ip_vs_stats_percpu\x00') sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001180), 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) nanosleep(&(0x7f0000000040), 0x0) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:03:08 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:03:08 executing program 5: set_thread_area(&(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:10 executing program 4: chroot(&(0x7f0000000080)='./file0\x00') msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgid(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000200), 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:03:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000001080)=0x4) 22:03:10 executing program 2: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) getresgid(&(0x7f00000013c0), &(0x7f0000000180), &(0x7f0000000280)) geteuid() getgroups(0x0, &(0x7f0000001480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 22:03:10 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) memfd_create(&(0x7f0000000140)='#cpusetem0\x00', 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000340)=0xe8) pipe2(&(0x7f00000006c0), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@broadcast, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:03:10 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000900)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)="6b657972696e6705", &(0x7f00000008c0), &(0x7f0000000340)='eth1vmnet0\x00', 0xfffffffffffffffd) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0'}, 0xb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="805da076ca24a3a37d71ef695c0f010dcececbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bbc4816166647902") 22:03:10 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000c4a3a5ee14122c7665ee8d650000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a00000000000000ff0200000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 22:03:10 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/96, 0x60, 0x0, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fcntl$getflags(r0, 0x40a) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x41}, 0x0) fcntl$setown(r0, 0x8, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x30, 0x0, @thr={&(0x7f0000000100)='\'', &(0x7f0000000080)}}, &(0x7f0000000280)) 22:03:10 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, 0x0, r2) 22:03:10 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0)="df", 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge_slave_1\x00', 0x10) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$nbd(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@loopback}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000006c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6, @remote}, 0x10) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") [ 488.723226] audit: type=1400 audit(1537308190.847:698): avc: denied { create } for pid=12815 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 488.834128] audit: type=1400 audit(1537308190.957:699): avc: denied { write } for pid=12815 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:11 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000004c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)) 22:03:11 executing program 2: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000001, 0x11, r0, 0x0) [ 489.153076] audit: type=1400 audit(1537308191.277:700): avc: denied { read } for pid=12815 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 490.444913] audit: type=1400 audit(1537308192.567:701): avc: denied { create } for pid=12815 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:13 executing program 4: mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/165) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getgroups(0x0, &(0x7f0000000240)) getpgrp(0x0) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:03:13 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getrusage(0xffffffffffffffff, &(0x7f0000001300)) 22:03:13 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_wait(r1, &(0x7f0000001a40)=[{}], 0x1, 0x0) 22:03:13 executing program 2: eventfd2(0x0, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffff9) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:03:13 executing program 0: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffff9c, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000680)) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000006c0), 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000200), &(0x7f0000000400), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000500), 0x0, 0x0) getegid() getpgid(0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000007c0), 0x4) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 22:03:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x93e, 0xf0ffffffffffff}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 22:03:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='#! ./file0 ppp0(proc#vboxnet'], 0x1c) 22:03:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, &(0x7f00000000c0), 0x0, 0x4c011, &(0x7f0000000340)=@un=@file={0x0, './file0\x00'}, 0x80) [ 491.570182] audit: type=1400 audit(1537308193.687:702): avc: denied { create } for pid=12867 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 491.590205] PF_BRIDGE: RTM_NEWNEIGH with invalid ifindex 22:03:13 executing program 1: getrandom(&(0x7f0000000140)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0416969ef69dc0f01eec4020d912c3918378776f4c402bd0a9000000080c4c19086d9f28fc9410feefa6b2179a6e5e5417545430fa2c4010d64ac1e5d31a328b7b74379dfb9d6adbe90dff3420f520c25130000007f") getuid() openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000080)="275ef362646576e67b656d3176626f786e6574312a2729656d30272c2800", 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast}, &(0x7f0000000240)=0xc) 22:03:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) io_setup(0x100000001, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f00000018c0)=[&(0x7f0000001480)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000013c0)="63e27b984f71da", 0x7}]) [ 491.743787] audit: type=1400 audit(1537308193.867:703): avc: denied { write } for pid=12867 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:14 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) readlink(&(0x7f0000000180)='./file2\x00', &(0x7f0000000240)=""/97, 0x61) clock_gettime(0x0, &(0x7f0000000300)) getpid() sched_rr_get_interval(0x0, &(0x7f0000000400)) mkdir(&(0x7f00000004c0)='./file1\x00', 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000840)='./file2\x00', &(0x7f0000000c80)) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000dc0)) lstat(&(0x7f0000000e00)='./file0/file0\x00', &(0x7f0000000e40)) getgid() stat(&(0x7f00000026c0)='./file1\x00', &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getegid() getresgid(&(0x7f0000002800), &(0x7f0000002840), &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getgroups(0x0, &(0x7f0000002e00)) getegid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003280), &(0x7f00000032c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)) timerfd_create(0x0, 0x0) lstat(&(0x7f0000004780)='./file3\x00', &(0x7f00000047c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005b80), 0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f0000000780)) getgid() getegid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getegid() stat(&(0x7f0000000940)='./file1\x00', &(0x7f0000000980)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:03:14 executing program 5: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 22:03:16 executing program 4: unshare(0x20400) capset(&(0x7f00000001c0)={0x20080522}, &(0x7f0000000200)) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040), 0x4) 22:03:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000080)) 22:03:16 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2800000000000000290000000200000000e46e0337a6dd45460000000000000000000077e0734c00"], 0x28}, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0x5}], 0xc}}], 0x488, 0x0) 22:03:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x8) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=[{0x10, 0x0, 0x1}], 0x10}}], 0x1, 0x0) 22:03:16 executing program 1: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000840)=@xdp, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000b80)=""/98, 0x62}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000d80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00'}) 22:03:16 executing program 5: socket$inet(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 22:03:16 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000700)=""/246) ioctl$EVIOCGREP(r0, 0x8010743f, &(0x7f0000000000)=""/174) 22:03:16 executing program 2: clock_settime(0x0, &(0x7f0000000300)={0x0, 0x1c9c380}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0356969ef69dc3641ffaa32233333c4c2958e09c443e17836f72666460f1bfd44c19086d962788f1635c49d520a7d0ac97d79fb0fc7fd79aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="428055a07d6969ef4769dc00f2460f588005000000c481d8145200060f38c50b7a1713c4a3cd3dc48813430f016a10660f478431508c0000f20f7c5706c462010d42002e1a1a42f931a3b75be2189fc4227992749f55") 22:03:16 executing program 0: timerfd_create(0x3, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000014c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001500)={{{@in=@local, @in6=@local}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000001600)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000001880), 0xc, &(0x7f0000001c00)={&(0x7f00000030c0)=@polexpire={0xc0, 0x1b, 0x0, 0x0, 0x0, {{{@in, @in6}}}}, 0xc0}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6, @in=@remote}}, {{@in6=@ipv4}, 0x0, @in=@dev}}, &(0x7f0000001840)=0xe8) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000c80)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000cc0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000180), 0xc, &(0x7f00000009c0), 0x0, &(0x7f0000000d00)}, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) syz_emit_ethernet(0xe, &(0x7f0000000b40)={@remote, @empty, [], {@mpls_mc}}, &(0x7f0000001380)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000e00), 0xc, &(0x7f0000001300)={&(0x7f0000000e40)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:03:16 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x9) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000041, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_SIOCADDRT(r0, 0x8916, &(0x7f0000000040)={0x0, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='bcsh0\x00'}) [ 494.835334] audit: type=1400 audit(1537308196.957:704): avc: denied { create } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 494.913569] audit: type=1400 audit(1537308197.037:705): avc: denied { write } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 494.957234] audit: type=1400 audit(1537308197.077:706): avc: denied { create } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:17 executing program 5: chroot(&(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getegid() dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000002f80)) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0, &(0x7f0000002fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003000)={{{@in=@remote, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000003100)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003140), &(0x7f0000003180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000005c40), 0x0, 0x0, &(0x7f0000005e00)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005e40)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000005f40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000060c0)={{{@in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006240)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006340)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006380)={'gretap0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000063c0)={{{@in6=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000064c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006500), &(0x7f0000006540)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000065c0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006640)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f5835c9356b7dae7dae0779fbc463fd7998b400ba000079aaff43d0e146010d64ac1e5d31a314b706e205987b7f") [ 495.219617] audit: type=1400 audit(1537308197.337:707): avc: denied { write } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 495.241825] audit: type=1400 audit(1537308197.337:708): avc: denied { read } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:17 executing program 3: r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) fcntl$setstatus(r0, 0x4, 0x2800) syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @dev, "825933e310b03a7d396c2bd0302215a0"}}}}, 0x0) [ 495.588211] audit: type=1400 audit(1537308197.707:709): avc: denied { create } for pid=12924 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:18 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000480)="b30000000026d5", 0x0) openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000940)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f0000000040), 0x0, 0x2, &(0x7f00000009c0)={0x77359400}, &(0x7f0000000a00), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:03:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 22:03:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'gre0\x00', 0x400}) close(r0) 22:03:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x5) keyctl$set_timeout(0xf, r0, 0x0) 22:03:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000e80)={@mcast2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x7f}, 0x20) 22:03:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) keyctl$describe(0x6, r0, &(0x7f0000000340)=""/4096, 0x1000) 22:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 22:03:19 executing program 5: unshare(0x20400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) 22:03:19 executing program 0: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f2c442ad07fec9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b78f4978c309c4c3916efafedd7f") dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x26a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)="003d07ff30084621ff3a3a66054a4b1eba409eea8ed6daf5fc476bda1c99d609f17d") seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000340)={0x0, 0x1, 0x6, @remote}, 0x10) init_module(&(0x7f0000000040)='\x00', 0x1, &(0x7f0000000180)="6367726f7570c47d00") close(0xffffffffffffffff) eventfd(0x0) getpgid(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000080)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:03:19 executing program 1: getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:03:19 executing program 3: prctl$intptr(0x21, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") [ 497.506160] audit: type=1326 audit(1537308199.627:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12995 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf776ebe9 code=0x0 22:03:19 executing program 5: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @broadcast, @remote}, &(0x7f0000000640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @empty, @multicast1}, &(0x7f0000000cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001600)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001640)=@xdp, &(0x7f00000016c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000019c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001a40)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001e00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002580)={'ifb0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000005c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005d00)={'team0\x00'}) syz_execute_func(&(0x7f00000005c0)="408055a03769ef69dc3641ffaa743223333333c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") [ 498.279349] audit: type=1400 audit(1537308200.397:711): avc: denied { create } for pid=13014 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 498.428597] audit: type=1400 audit(1537308200.547:712): avc: denied { write } for pid=13014 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 498.740268] audit: type=1400 audit(1537308200.857:713): avc: denied { read } for pid=13014 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:22 executing program 4: io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r0, 0xe7c4e29, &(0x7f0000000040)) 22:03:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x80006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x164, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x1b4) 22:03:22 executing program 1: socketpair$inet(0x1e, 0x4, 0x0, &(0x7f0000002500)={0x0, 0x0}) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000080)=@llc={0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000240)}, 0x0) 22:03:22 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ustat(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) ppoll(&(0x7f0000000180), 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000240), 0x8) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:22 executing program 0: keyctl$set_reqkey_keyring(0xa, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @empty, @broadcast}, &(0x7f0000001100)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0xfffffffffffffe58, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f00000000c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000200)=0xffffffffffffff4d) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r0, r2, 0x0) 22:03:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @local}, {0x2, 0x0, @local}, 0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004c00)="6c6f3a08000600100000040900"}) 22:03:22 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000140)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:03:22 executing program 3: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0/file0/file0\x00', &(0x7f00000006c0)='trusted.overlay.upper\x00', &(0x7f0000000900)={0x0, 0xfb, 0x15, 0x0, 0x0, "65cefbbab0952434272ce5a3068d1147"}, 0x15, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001980)) socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getgid() lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000007c0)) 22:03:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@multicast2}, 0xc) 22:03:23 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff21, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) 22:03:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 22:03:24 executing program 4: setrlimit(0x0, &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000880)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000008c0)}) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000008c0)=0xe8) getpid() keyctl$set_reqkey_keyring(0xa, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000900)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) getdents64(0xffffffffffffffff, &(0x7f0000000940)=""/83, 0x53) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, 0x18) pipe(&(0x7f0000000080)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:03:24 executing program 0: clock_getres(0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000180), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) unshare(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@local, @in=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000840)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:24 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) rmdir(&(0x7f0000000180)='./file0\x00') 22:03:24 executing program 2: personality(0x4500009) io_setup(0x5b3, &(0x7f0000000040)) 22:03:24 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0xffb0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 22:03:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 22:03:25 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000440)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) ftruncate(0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000001600)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f00000015c0), 0xc, &(0x7f0000001680)={&(0x7f0000001640)=ANY=[]}}, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) writev(0xffffffffffffffff, &(0x7f0000000300), 0x0) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:03:25 executing program 3: ioprio_get$pid(0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) gettid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000240)={0x8, "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", 0x1000}, 0x1006) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:03:25 executing program 2: setrlimit(0x7, &(0x7f0000000240)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000140)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:03:25 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) connect$inet(r0, &(0x7f0000000040), 0x10) 22:03:25 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000000200)) prctl$seccomp(0x16, 0x1, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_delete(0x0) 22:03:25 executing program 2: keyctl$dh_compute(0x9, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") [ 504.026304] audit: type=1400 audit(1537308206.147:714): avc: denied { create } for pid=13124 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 504.085390] audit: type=1326 audit(1537308206.207:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13127 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=40000003 syscall=240 compat=1 ip=0xf777fbe9 code=0x0 [ 504.171703] audit: type=1400 audit(1537308206.287:716): avc: denied { write } for pid=13124 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 504.457685] audit: type=1400 audit(1537308206.577:717): avc: denied { read } for pid=13124 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 504.769650] audit: type=1400 audit(1537308206.887:718): avc: denied { create } for pid=13124 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 504.892634] audit: type=1326 audit(1537308207.017:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13127 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=40000003 syscall=240 compat=1 ip=0xf777fbe9 code=0x0 22:03:27 executing program 4: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@link_local={0x11}, @empty, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @random="f8bf88df5b1b", @remote, @dev, @rand_addr}}}}, &(0x7f0000000040)) 22:03:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") 22:03:27 executing program 3: unshare(0x40400) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syncfs(r0) 22:03:27 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x139, &(0x7f0000000080)}) fstat(0xffffffffffffffff, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) 22:03:27 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:27 executing program 2: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 22:03:27 executing program 2: io_setup(0x1ff, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000940)) 22:03:27 executing program 3: syslog(0x0, &(0x7f0000000840)=""/177, 0xb1) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) eventfd2(0x0, 0x0) poll(&(0x7f00000001c0), 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000003180)={0x0, &(0x7f0000003140)}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000540)) getitimer(0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000380), 0x0) sched_yield() socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0de0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae575b32e1ac4010d64ac1e5d31a3b744dbe271fb0703") open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000640)='./file1\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xc) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getegid() socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x0, @dev}}) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f00000007c0)) 22:03:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000231000)={@multicast2, @loopback, @loopback}, 0xc) 22:03:28 executing program 2: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000a00)=""/203, 0xcb) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:03:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8), &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 22:03:28 executing program 0: vmsplice(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000040)=""/21, &(0x7f0000000080)=0x15) waitid(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)) 22:03:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) 22:03:29 executing program 1: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) pipe(&(0x7f00000001c0)) syz_genetlink_get_family_id$team(&(0x7f0000001040)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000400)={'bridge_slave_0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000005c0)=@xdp, &(0x7f0000000700)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000001640)) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0), 0x0, 0x0, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900), &(0x7f0000001940)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001ac0)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b00)={{{@in=@multicast1, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @empty, @loopback}, &(0x7f0000001d00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@mcast2}, &(0x7f0000001d80)=0x10c) getpeername$packet(0xffffffffffffffff, &(0x7f0000001e80), &(0x7f0000001ec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'eql\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940)={@ipv4={[], [], @rand_addr}}, &(0x7f0000002980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000029c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000002ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004640)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004780)={{{@in6, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004880)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a80)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004b00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b40)={{{@in=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000004c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000000200), 0xc, &(0x7f0000005600)={&(0x7f0000004c80)={0x14}, 0x14}}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000002c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:03:29 executing program 5: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80010020]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)) 22:03:29 executing program 3: clock_gettime(0x4, &(0x7f00000001c0)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") creat(&(0x7f0000000280)='./file0\x00', 0x0) getpid() getitimer(0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:29 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) getpgrp(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:03:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) [ 507.716067] audit: type=1400 audit(1537308209.837:720): avc: denied { create } for pid=13200 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 507.755989] audit: type=1400 audit(1537308209.877:721): avc: denied { create } for pid=13197 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 507.784868] audit: type=1400 audit(1537308209.907:722): avc: denied { write } for pid=13200 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 507.814238] audit: type=1400 audit(1537308209.937:723): avc: denied { write } for pid=13197 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:30 executing program 0: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6000, 0x0, &(0x7f0000ffa000/0x6000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000180), &(0x7f00000000c0), &(0x7f00000006c0)) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200), &(0x7f0000000340), 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 22:03:30 executing program 3: clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) poll(&(0x7f00000000c0)=[{r0, 0x4}], 0x1, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:03:30 executing program 5: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) keyctl$set_reqkey_keyring(0x10, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0x0) mlock2(&(0x7f00007e0000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x20000000000001fe}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380), &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:30 executing program 2: prctl$getname(0x10, &(0x7f0000000600)=""/68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000540), 0x4) preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$getname(0x10, &(0x7f0000000940)=""/219) syz_emit_ethernet(0x0, &(0x7f0000000a40)=ANY=[], &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:03:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0xb4}, 0x4) 22:03:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 509.319313] audit_printk_skb: 21 callbacks suppressed [ 509.360082] audit: type=1400 audit(1537308211.437:731): avc: denied { create } for pid=13218 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001240), 0x0) 22:03:32 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountstats\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000230, 0x10400003) 22:03:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:03:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000ff0)=[{}, {0x6}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 22:03:32 executing program 1: clock_gettime(0x6, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000080)) io_destroy(0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000000)) 22:03:32 executing program 2: r0 = socket$inet6(0xa, 0x100000002, 0x0) r1 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x11, &(0x7f0000000280)=0xc2, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 22:03:32 executing program 5: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getgroups(0x2, &(0x7f0000000480)=[0x0, 0xee00]) mount$fuse(0x0, &(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)='fuse\x00', 0x0, &(0x7f0000001b00)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) 22:03:33 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000001340)="ff", 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 22:03:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:03:33 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) getuid() write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001980)=""/16, &(0x7f00000019c0)=0x10) getpid() ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000005c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) add_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffa) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000640), 0x4) add_key(&(0x7f0000001800)='encrypted\x00', &(0x7f0000001840), &(0x7f0000001880), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) request_key(&(0x7f00000004c0)='asymmetric\x00', &(0x7f0000000500), &(0x7f0000000540)='\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:03:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x2, 0x130, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x0, 0x0, 0x0, 'nr0\x00', 'team0\x00', 'vlan0\x00', 'veth0_to_team\x00', @remote, [], @remote, [], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1}]}, 0x178) 22:03:33 executing program 3: prctl$void(0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000000640)) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000009c0)) setfsgid(0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000800), &(0x7f0000000840)=0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6gre0\x00'}) setresuid(0x0, 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000700)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000002c0)={0x83139a82865b1543}, 0xffffff0a) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f00000006c0)=',\x00', 0x2, 0x0) [ 511.710366] audit: type=1400 audit(1537308213.827:732): avc: denied { create } for pid=13295 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 511.976818] audit: type=1400 audit(1537308214.097:733): avc: denied { write } for pid=13295 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 512.453710] audit: type=1400 audit(1537308214.577:734): avc: denied { read } for pid=13295 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 512.511926] audit: type=1400 audit(1537308214.627:735): avc: denied { create } for pid=13295 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 512.598546] audit: type=1400 audit(1537308214.717:736): avc: denied { write } for pid=13295 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:35 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000019c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@remote, @in6=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000240), 0xc, &(0x7f0000001940)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffe) fcntl$getown(0xffffffffffffffff, 0x9) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) finit_module(0xffffffffffffffff, &(0x7f0000000200)='/dev/rtc0\x00', 0x0) 22:03:35 executing program 2: creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) times(&(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000680), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) connect(0xffffffffffffffff, &(0x7f0000000540)=@ax25={0x3, {"8b8a0f0f010572"}}, 0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/144, 0x90, 0x0, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 22:03:35 executing program 1: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@loopback, @local, @loopback}) memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000003c0)={'team_slave_1\x00', {0x2, 0x0, @remote}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={@local}) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000340)={0x60}, 0x60) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000400)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:03:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc), 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x482, 0x0, 0x0, 0x4e) 22:03:35 executing program 5: add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0), &(0x7f0000000400)="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", 0x320, 0xfffffffffffffffe) 22:03:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) readlinkat(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)=""/29, 0x1d) 22:03:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd'}, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x0, &(0x7f0000000000)) 22:03:35 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000400)={0x28}, 0x28) getpgid(0x0) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") add_key(&(0x7f0000000580)='id_resolver\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f00000002c0)=""/232, 0xe8) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000440), 0x88) [ 513.463714] audit: type=1400 audit(1537308215.587:737): avc: denied { create } for pid=13329 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:03:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x7ff, 0x0, 0xffffffffffffff1d, 0x7e0e}) 22:03:35 executing program 1: symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:36 executing program 5: request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100), &(0x7f0000000140)='posix_acl_access]-\x00', 0xffffffffffffffff) 22:03:36 executing program 2: getpgrp(0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000240)) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) [ 515.540042] audit: type=1400 audit(1537308217.657:738): avc: denied { create } for pid=13376 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 516.338093] audit: type=1400 audit(1537308218.457:739): avc: denied { create } for pid=13376 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:03:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x541f, 0x0) 22:03:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)) 22:03:38 executing program 3: setrlimit(0x8, &(0x7f0000000040)) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 22:03:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0xc100) write$binfmt_aout(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="0000000000000000ff00001d01ffffffffffffff00dfffffffffffffff000000"], 0x20) 22:03:38 executing program 1: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 22:03:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x800, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)}]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_getevents(r1, 0x0, 0x1000000, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}) 22:03:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0xa, &(0x7f00000001c0)) 22:03:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) close(r0) 22:03:38 executing program 5: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:03:38 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f00000002c0)='keyring\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000200)}) set_tid_address(&(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0c10fef69dcc40185635afe660f3a608600088041cb69919191913d06440f18400e770f78993d233d23410feefa437400660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") 22:03:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='sessionid\x00') read$FUSE(r0, &(0x7f0000003240), 0xfcd) 22:03:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) [ 517.056930] audit: type=1400 audit(1537308219.177:740): avc: denied { create } for pid=13404 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 517.249243] audit: type=1400 audit(1537308219.367:741): avc: denied { write } for pid=13404 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 517.764109] audit: type=1400 audit(1537308219.887:742): avc: denied { read } for pid=13404 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 517.830880] audit: type=1400 audit(1537308219.947:743): avc: denied { create } for pid=13404 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 517.911082] audit: type=1400 audit(1537308220.027:744): avc: denied { write } for pid=13404 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:40 executing program 4: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000005c0)="f5568055a07a7a69ef69dc00d990c841ff0fc4017b2d11c642651d69ca38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5dc422699ea9000000807f") socket$nl_netfilter(0x10, 0x3, 0xc) add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000500), 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) geteuid() keyctl$get_persistent(0x16, 0x0, 0x0) request_key(&(0x7f0000000680)='rxrpc\x00', &(0x7f00000006c0), &(0x7f0000000740)='veth0_to_team\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000840)='big_key\x00', &(0x7f0000000a80), &(0x7f0000001300), 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000ac0)='encrypted\x00', &(0x7f0000000b00), &(0x7f0000000b40), 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000340)=""/174, &(0x7f0000000280)=0xae) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) clock_gettime(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_execute_func(&(0x7f0000000400)="3e42d1e6f336d152322e36429866440f179b08000000f36f67410f71f7fff3400fb8ad0c36448d8f4978c3c4c4c3e94869a20ec403f1401836") 22:03:40 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000140)=0x4) 22:03:40 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000), &(0x7f0000000080)) 22:03:40 executing program 3: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:03:40 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x208200) vmsplice(r0, &(0x7f0000000280), 0x0, 0x0) 22:03:40 executing program 5: eventfd2(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) get_robust_list(0x0, &(0x7f0000001900)=&(0x7f00000018c0)={&(0x7f0000001840)={&(0x7f0000001800)}, 0x0, &(0x7f0000001880)}, &(0x7f0000001940)=0x18) dup(0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001980), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) readv(0xffffffffffffffff, &(0x7f0000001740), 0x0) memfd_create(&(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000500)) recvmsg(0xffffffffffffff9c, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000540)=""/155, 0x9b}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000001700), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:03:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)={0xb}, 0xb) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700), 0x0, &(0x7f0000003780)=""/232, 0xe8}}], 0x1, 0x2, &(0x7f0000003bc0)) recvmmsg(r0, &(0x7f0000000740)=[{{&(0x7f0000000100)=@generic, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/54, 0x36}}], 0x1, 0x0, &(0x7f0000000780)={0x77359400}) 22:03:40 executing program 2: prctl$intptr(0x1d, 0x15) prctl$void(0x0) request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0)='security,\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) pipe2(&(0x7f0000000280), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:03:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000001fde), 0x2) 22:03:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0), 0x4) 22:03:41 executing program 5: getrandom(&(0x7f00000003c0)=""/148, 0xf2, 0x0) memfd_create(&(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000006f00)=0xfffffffffffffe9d) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000680)=0xc) getgid() getgroups(0x0, &(0x7f00000006c0)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000880)=ANY=[], 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000ac0)) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000080)) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000380)='io.bfq.weight\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@local, @in6}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:03:41 executing program 3: r0 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) 22:03:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$nl_xfrm(r0, &(0x7f0000000840)={&(0x7f0000000140), 0xc, &(0x7f0000000800)={&(0x7f0000000440)=@updpolicy={0xfc, 0x19, 0x105, 0x0, 0x0, {{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in=@remote, 0x0, 0x6c}, 0x0, @in=@remote}]}]}, 0xfc}}, 0x0) 22:03:43 executing program 2: socket$unix(0x1, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000380)}) syz_genetlink_get_family_id$team(&(0x7f0000000940)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='lo.em1eth0trusted$\x00', 0x0) [ 520.840327] audit: type=1400 audit(1537308222.957:745): avc: denied { create } for pid=13484 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:03:43 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:03:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000080)="580000001400add427323b470c458c560a067fffffff81004e22000000050028925aa80000000000000080000efffeffe809000000fff5dd000000100003fffffffffffff000cfb193e7ee00000000000000000000000000", 0x58}], 0x1) 22:03:43 executing program 3: r0 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) 22:03:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000000540)='\x00', 0x1, r1) r3 = add_key$user(&(0x7f0000fc0ffb)='user\x00', &(0x7f0000752ffb)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000000)="b3", 0x1, r1) keyctl$update(0x2, r3, &(0x7f0000000480)="df02754677212dfc3e2acc26fdc3ffa64813da494137e175e9f2780ac5e2a09f43a1fcebf272a5a135de92bf4a9033933824f6e6aa023895113293535d1c0066d20e0f275188b4b4c187e18774fc2227cbb60fc6697f5337726164c8fbe1181e6d50986cd98a5c44ac0ec375deb27eafcf7d06438f252510d87bd91d03e7dc2faed85adcd88ca30e75b1e143a72d94defa187e48b89efbbbcc9b9a9a307353df7a21affce4e9149eb122cbc356cb681365afd979e97b57b596e901864a68679f", 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000200)={r2, r3, r2}, &(0x7f0000000300)=""/5, 0x166, &(0x7f0000c61fc8)={&(0x7f00000002c0)={'crc32c-generic\x00'}}) 22:03:43 executing program 0: r0 = socket(0x10, 0x2, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") write(r0, &(0x7f00000001c0)="1f0000000202fffffd3b54c007110000f30501000b000600000423ca0000cf", 0x1f) 22:03:43 executing program 3: recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff2c4025dab3e44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d05987b7f") getpgrp(0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000540)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000780)="0f0f51028ec4a1797e3365660fd0cdc4a34d79a4e7105b00008dc442950607c4c1fd6fae09000000c443fd004e0000c1ae0f00000007420f0faa00100002bbc401bd5fd2") 22:03:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'syz_tun\x00'}) [ 521.153665] audit: type=1400 audit(1537308223.267:746): avc: denied { create } for pid=13492 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 521.199571] audit: type=1400 audit(1537308223.317:747): avc: denied { create } for pid=13492 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 521.291441] audit: type=1400 audit(1537308223.407:748): avc: denied { write } for pid=13492 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 521.349638] audit: type=1400 audit(1537308223.467:749): avc: denied { write } for pid=13492 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:43 executing program 5: syz_emit_ethernet(0xe, &(0x7f00000010c0)={@empty, @random="d2e2fa897484", [], {@generic={0x88ca}}}, 0x0) 22:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a07d6969ef4769dc00f2460f588005000000c481d8145200060f38c50b7a1713c4a3cd3dc48813430f016a10660f478431508c0000f20f7c5706c462010d42002e1a1a42f931a3b75be2189fc4227992749f55") getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$getname(0x10, &(0x7f0000000940)=""/219) syz_emit_ethernet(0x0, &(0x7f0000000a40)=ANY=[], &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000000c0)}) 22:03:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x40000001b) dup3(r1, r0, 0x0) 22:03:44 executing program 2: chmod(&(0x7f00000002c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000180)=@abs, 0x6e) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_execute_func(&(0x7f0000000040)="42805da00fef69dc0f01ee263a200986bdd4c9bdd4c941cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") [ 522.483216] audit_printk_skb: 24 callbacks suppressed [ 522.488446] audit: type=1400 audit(1537308224.607:758): avc: denied { read } for pid=13523 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 INIT: Id "6" respawning too fast: disabled for 5 minutes [ 522.608721] audit: type=1400 audit(1537308224.727:759): avc: denied { create } for pid=13533 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 522.972182] audit: type=1400 audit(1537308225.087:760): avc: denied { create } for pid=13523 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 INIT: Id "5" respawning too fast: disabled for 5 minutes 22:03:45 executing program 4: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000240)='eth0nodevcpuseteth1@*\',procS|\x00', 0xfffffffffffffff8) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getgroups(0x0, &(0x7f0000000180)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0xc) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:03:45 executing program 5: socket$unix(0x1, 0x7a345de2f1e03432, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f0000000540)) clock_settime(0x0, &(0x7f00000004c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:03:45 executing program 1: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) mremap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:03:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) umount2(&(0x7f0000000380)='./file0\x00', 0x0) 22:03:45 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="a29ab0893fde", [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0xffffff84, 0x0, @remote, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)) 22:03:45 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000f80)=@rc, &(0x7f00000007c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @remote, @multicast2}, &(0x7f0000001940)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000bc0), 0xc, &(0x7f00000019c0)={&(0x7f0000001980)=@getstats={0x1c}, 0x1c}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @remote}, &(0x7f0000000200)=0x6c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @rand_addr}, &(0x7f0000000300)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0xfffffffffffffe58, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000580)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000009c0), 0x0, &(0x7f00000002c0)=""/1, 0x1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001e00)={0x8, "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", 0x1000}, 0x1006) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000001000)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) geteuid() lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000500)) getpgid(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000a80)={'lo\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) sendto$unix(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, &(0x7f0000001140)=@abs, 0x6e) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) 22:03:45 executing program 2: mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000fec000/0x1000)=nil) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 22:03:45 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='n'], 0x1) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0x2020000, 0x4) recvmsg(r1, &(0x7f0000005f40)={&(0x7f0000005d00)=@can, 0x80, &(0x7f0000005e40), 0x0, &(0x7f0000005e80)=""/138, 0x8a}, 0x2) shutdown(r0, 0x1) 22:03:46 executing program 2: sync() ioprio_set$uid(0x0, 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000001c0)={{0x0, @dev, 0x0, 0x0, 'rr\x00'}, {@local}}, 0x44) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:03:46 executing program 3: clock_nanosleep(0x4, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000500)) syslog(0x0, &(0x7f00000007c0)=""/83, 0x3d) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000680)=@abs, 0x6e) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000700)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f00)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) geteuid() getresuid(&(0x7f0000005d80), &(0x7f0000000040), &(0x7f0000005e00)) getgroups(0x0, &(0x7f0000005e40)) lstat(&(0x7f0000005e80)='./file0\x00', &(0x7f00000002c0)) stat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000006000)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006040)={{{@in=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006140)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006300)=0xe8) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006480)={&(0x7f00000009c0)=@proc, 0xc, &(0x7f0000005d00), 0x0, &(0x7f0000006340)}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)) syz_open_procfs(0x0, &(0x7f0000000040)) prctl$setname(0xf, &(0x7f0000000640)="736d6c696e7591a991ec44fc292ed8fbd45a48a561cb172e9dadb2c00c979d163cc02e83efe5d338a0012aff030000130000000000000000") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340), &(0x7f0000000200)=0x20c) timerfd_create(0x0, 0x0) io_setup(0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:03:46 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000380), 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ipx\x00') syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000007680)) ioctl$void(0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000007600)) recvmmsg(0xffffffffffffffff, &(0x7f00000074c0), 0x0, 0x0, &(0x7f0000007640)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@dev, @broadcast}, &(0x7f0000000200)=0xc) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00') prctl$getname(0x10, &(0x7f0000000280)=""/17) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff2e0ac4010d64ac1e5d31a314b706e298987b7f") fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000480)="b30000000026d5", 0x0) openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:03:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes 22:03:48 executing program 4: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') lseek(r0, 0x0, 0x0) 22:03:48 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/226, 0xfffffd85}], 0x1) recvfrom(r0, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x307) close(r0) 22:03:48 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000140)={{0x1}}) 22:03:48 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x4) getpgid(0x0) gettid() getpid() getpgid(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe(&(0x7f00000001c0)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) socket$unix(0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) setitimer(0x0, &(0x7f00000006c0), &(0x7f0000000680)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000940), 0x0, 0x0, &(0x7f00000047c0)) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0410fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa0f9a5f0beefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) socket$inet(0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) memfd_create(&(0x7f0000000400)='eql\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@multicast1, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@remote, @in6=@dev}}, {{@in=@loopback}}}, &(0x7f00000003c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14) 22:03:48 executing program 2: syslog(0x0, &(0x7f0000000240)=""/147, 0x93) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000180)) creat(&(0x7f00000003c0)='./file0\x00', 0x0) clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") accept4(0xffffffffffffff9c, &(0x7f0000000700)=@pppol2tpv3in6, &(0x7f0000000080)=0x80, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:03:48 executing program 3: dup(0xffffffffffffff9c) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:03:48 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000000c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000180)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000004c0)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f00000003c0)=""/231) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[], 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 22:03:49 executing program 2: getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0x4d) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getpid() getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000004b00)) getgid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000004dc0)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() geteuid() getresgid(&(0x7f00000052c0), &(0x7f0000005300), &(0x7f0000005340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006740)) stat(&(0x7f0000006780)='./file0\x00', &(0x7f00000067c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") [ 526.938059] audit: type=1400 audit(1537308229.057:761): avc: denied { create } for pid=13603 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 527.114076] audit: type=1400 audit(1537308229.227:762): avc: denied { write } for pid=13603 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 527.521172] audit: type=1400 audit(1537308229.637:763): avc: denied { read } for pid=13603 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0xd803}) r1 = socket$nl_route(0x10, 0x3, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/117, 0xffffff55}], 0x1) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:03:49 executing program 3: unshare(0x20400) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'ipddp0\x00'}}, 0x80) 22:03:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) INIT: Id "1" respawning too fast: disabled for 5 minutes 22:03:50 executing program 1: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff62) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0928523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460fac1b0030002e363e44d31b31a314b706e205987b7f") accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 22:03:51 executing program 4: clock_gettime(0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000380), 0x0) chdir(&(0x7f0000000180)='./file0\x00') socket$inet(0x2, 0x0, 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000007c0)='net/udp6\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000840)) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001c40)) lstat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000880)=""/4096) lstat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001c00), 0x0, &(0x7f0000001e00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0d1c4427d13380f01ee913591913d06290077b478993d233d23410feefa6b2179660f38302f660fcddf03cb40697907ffffffff66430f69734de2989f7f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000003c0)=""/95, 0x5f, 0x0, 0x0, 0x0) 22:03:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 22:03:51 executing program 1: timerfd_create(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) fchown(0xffffffffffffffff, 0x0, 0x0) getuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[], 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@xdp, &(0x7f0000000340)=0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000100), 0xc, &(0x7f0000000740)={&(0x7f0000000800)=@gettfilter={0x24}, 0x24}}, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000240), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@deltfilter={0x24}, 0x24}}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) pipe(&(0x7f00000000c0)) ioctl$void(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:03:51 executing program 5: getrlimit(0x0, &(0x7f0000000040)) inotify_init() mkdir(&(0x7f0000a7aff6)='./control\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x0) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f000003a000)='./control\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") getuid() 22:03:51 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$nbd(0xffffffffffffffff, &(0x7f00000003c0), 0x10) 22:03:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000c07e98)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 22:03:51 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) sched_setscheduler(0x0, 0x0, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 22:03:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000140)={'team_slave_1\x00', {0x2, 0x0, @local}}) 22:03:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @multicast2}, 'veth0\x00'}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'rose0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) unshare(0x0) inotify_init() creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 22:03:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet6_mreq(r0, 0x29, 0x1, &(0x7f0000001400), &(0x7f0000000140)=0x14) 22:03:52 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, &(0x7f00000002c0)) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x800000031, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f00000002c0)=""/129, 0x81) 22:03:52 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet(0x2, 0x3, 0x6) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000340), &(0x7f0000001900)=0xfffffffffffffe98) ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000005c0)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x2, {0x2, 0x0, @rand_addr}, {0x2, 0x4e24, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7fff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x2, 0x12) 22:03:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000080), 0x4) 22:03:54 executing program 3: getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:03:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0xa, r1, 0x0) 22:03:54 executing program 2: r0 = socket(0x2, 0xa, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000001600)={0x14}, 0x14}}, 0x0) 22:03:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) utime(&(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)) 22:03:54 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000440), &(0x7f00000006c0)="01a20228947c39e9df9703014800f5e552d1a8fa86486489aceb331f7647cf9e1f0229c800f60cc6724fd50b0ceca62413f842d79331e64703e946e4e676278c68c0fb160e29766e88", 0x49, r2) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'crc32-generic\x00'}}) 22:03:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:03:54 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 22:03:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10, 0x7a00000000000000}, 0xc, &(0x7f0000023ff0)={&(0x7f00000000c0)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) [ 532.725368] audit: type=1400 audit(1537308234.847:764): avc: denied { create } for pid=13727 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:55 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001840)) setgid(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/4096, &(0x7f0000000080)=0x1000) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 532.879554] audit: type=1400 audit(1537308234.997:765): avc: denied { create } for pid=13727 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:55 executing program 5: unshare(0x20400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fadvise64(r0, 0x0, 0x0, 0x0) 22:03:55 executing program 3: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:03:56 executing program 4: r0 = memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(r0, &(0x7f0000000240)='U', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000001380), &(0x7f00000003c0)="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", 0xc42, 0xffffffffffffffff) 22:03:56 executing program 0: pselect6(0x40, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000600)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000880)=""/192, &(0x7f0000000940)=0xc0) seccomp(0x0, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:03:56 executing program 2: truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@loopback, @multicast1}, &(0x7f00000006c0)=0x8) syz_execute_func(&(0x7f00000002c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 22:03:56 executing program 1: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() 22:03:56 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000300, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x5000000, 0x0, 0x6]}}) 22:03:56 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000001200)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080104000c00c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4b85a01016b8349", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 22:03:56 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) fcntl$getown(0xffffffffffffffff, 0x9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000001440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) geteuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:03:56 executing program 5: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x800, @dev}, 0xfdfa, &(0x7f0000000180), 0x0, &(0x7f0000000200), 0xfe}, 0x0) 22:03:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000400)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000100), 0x4) 22:03:57 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0xffffff11) 22:03:57 executing program 2: futex(&(0x7f0000000100), 0x400000086, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000340)={0x90}, 0x90) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:03:57 executing program 0: add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:03:59 executing program 4: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) eventfd(0x0) alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000100)=0xc) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0xffffffffffffff07}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000040)=0xfffffffffffffd2f) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000580)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000500)={0x50}, 0x50) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getgroups(0x0, &(0x7f0000001700)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:03:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a07d6969ef4769dc00f2460f588005000000c481d8145200060f38c50b7a1713c4a3cd3dc48813430f016a10660f478431508c0000f20f7c5706c462010d42002e1a1a42f931a3b75be2189fc4227992749f55") getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000300)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ptrace(0xffffffffffffffff, 0x0) prctl$getname(0x10, &(0x7f0000000940)=""/219) syz_emit_ethernet(0x0, &(0x7f0000000a40)=ANY=[], &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:03:59 executing program 1: syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgid() chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000240)={0x0, &(0x7f0000000200)}, 0x10) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 22:03:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000000340)=@filename='./file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x40100004, &(0x7f0000000140)='ramfs\x00') 22:03:59 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) read(r0, &(0x7f0000000080), 0x0) 22:03:59 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) 22:03:59 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000140)={"67726530008e1500", @ifru_data=&(0x7f0000000000)="c67325349920efb6ab470871c25ea8526cd1aab7b4a7b3f40f2b7a0047f72b23"}) 22:03:59 executing program 5: r0 = memfd_create(&(0x7f0000000000)='ppp1&\x00', 0x6) fcntl$addseals(r0, 0x409, 0xa) fallocate(r0, 0x3, 0x0, 0x80000001) [ 537.296988] audit: type=1400 audit(1537308239.417:766): avc: denied { create } for pid=13815 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 537.338308] audit: type=1400 audit(1537308239.457:767): avc: denied { write } for pid=13815 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:03:59 executing program 3: eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xfffffffffffffe29) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) 22:03:59 executing program 0: getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/125, &(0x7f0000000300)=0x7d) munmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) mprotect(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) 22:04:00 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) recvmmsg(r0, &(0x7f0000000f00)=[{{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)}}], 0x1, 0x0, &(0x7f0000001000)={0x0, 0x1c9c380}) write$binfmt_elf64(r0, &(0x7f0000001040)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 22:04:00 executing program 2: clock_settime(0x0, &(0x7f0000000600)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:04:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x361, &(0x7f00000002c0), 0x2ca, &(0x7f0000000300)}}], 0x40000000000019e, 0x0) 22:04:02 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f0000000280)='./file0\x00') 22:04:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c17bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc354cd43963dff2436657aa924bd5f796e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374dc07142a1c2e9d3caefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec00000000000000", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 22:04:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) getpgid(0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000006c0)=@req={0x28, &(0x7f0000000680)={'veth0_to_team\x00', @ifru_ivalue}}) fstat(0xffffffffffffffff, &(0x7f0000000880)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000700)='/dev/uinput\x00', 0x0, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) statfs(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=""/124) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)=@proc, 0xc, &(0x7f0000000400), 0x0, &(0x7f0000000900)=ANY=[]}, 0x0) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480), &(0x7f0000000a00), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000002c0)="42805da00d0fef69dc640f1750000dce0ecf41f7410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575c4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:04:02 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:04:02 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="095e0ca80f58aaaaaaaaaabb86dd60a1d90c000000000000000000000000bbfe8000000000000000000000000000aa0420880b0000000000000800000086dd080088be00000000100000000100010000000000080022eb0000000020000000020000000009000000000000080065580000000000000000000000"], &(0x7f0000000440)) clock_gettime(0x0, &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) timerfd_create(0x0, 0x0) 22:04:02 executing program 3: rt_sigprocmask(0x1, &(0x7f00000001c0), &(0x7f0000000200), 0x8) getrusage(0x0, &(0x7f00000006c0)) socketpair(0x1a, 0x0, 0x0, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000080)=""/103) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0c2a3ef69dc0f01ee0dcec4a1a6586bfaefefffff9191a33d06290028770f0f9958233d23416b2179660f38302fbae5e5e57566410f5f5f0ec4010d64ac1e5d31a3b7e298") ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @multicast2}, {0x0, @random="dc821ce1c181"}, 0x0, {0x2, 0x0, @dev}, 'bridge_slave_1\x00'}) 22:04:02 executing program 0: pselect6(0x31, &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000ff8)={0x0, 0x989680}, &(0x7f0000000ff8)={&(0x7f0000000ff8), 0x8}) 22:04:02 executing program 5: sync() eventfd2(0x0, 0x0) epoll_create1(0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='.\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000640)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000440)=0x1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000008c0)={0x0, 0x1, 0x1, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setresgid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:04:02 executing program 0: r0 = memfd_create(&(0x7f0000000380)="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", 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000004c0)={0xe, 0x0, 0x0, 0x0, 0xff5, "fcad780ca1b4a4fc77a8bd6f0a2634a556e6255d02b479167154c1d6c485ee497587bceaeb198fef190745ee7ae7200bbcfa6261cbfee4ae7b83ffc7cc332ed43df1af2a01c1be6b139ec9866a701a1de56e1a421898432b17981b56742eccb5aed357384b78991dc273ab5853d69941f6851aed6eb20d70e100d279dc04d21cc018776e9c80ab12adc7d8e235b2bba704ea499d8264572e3183b24be4672f14f896ac96596312337e2db160ad9a38dd746d7072008f022494e8bd1ee96aea0b73ffd9c0f674514446f3bf6928a30884b73c6492132d98ba4489f4808bdaee57b1101e4ffc2cbb8cca2095744579792d87d5dcb26cae95ef6a6bc3b5680b160605928cf447747056e36ccb09c36233b2995468d1dda4410b0172b159c95107812dc30d40433832ee11db7db75f473f7a29a693a6bfdaf7fcd5ca931c62526edd428a397a651187216923a4523619c2910d7a2ae9870a573e5e1dcc283536bd537c135c2501298390b22230a005d149624612758a13dba60932446b941589eeea75b58ff3d801be36fe2ce71d28929e684675756128b99da1ad3482c411dfc25de56e115fab9380ebb52f6592fb8999dc182154b1550d0bf88d472c689ba634870314bcdb5e0d2a803f3aba49f15a977a9febc2ddf57d58cfc715590d4e3c2cc134e3aaae8ae4972144b5130e52fc35f3a0f5b5ee84068cb68d72af73697a17663e7ea743e1522484c2bc48a65ef09153313d70a5153c783965094bf961f93f198fa4d4f3d9cafe711efd627821c741fefe896052528da9854d937bc4ba6ada666b0305e46b3946091d9079b6f08e1da72e8e736412a985a775c102173a02acbe3e8586cb9d2c07cfe61b8dd64f69dc143aa1705fda7b40f4e474f8f525f41abfea03fc61a3a3cabf117833e57c3595aae4d7175bf1bdaf3ab9fdf3b4505767db5af59f7622e625b14076baec352cfca8ccffb029f8eebe9883d186d9c0c83e48b06f5a9f29ee2acd6c399f803f34e82a0c1e012b8d6b7e0b8011b4974ec3765892165a5f5da1900697a0f78ec00ae430ab7d802d12e213c9a4f601f77682102d8a4d8b0e52973a0ae33ed35d0ea2588bd4aff1a7d3e376b96c7fda311148fb05520bfe661a6680be2d2473739c6a7df756f337e821718443fa127ded530f1ef20f1dd85c7e0e1973a5e208c13d3497623b48b572920129b074e046e2c107942339ba83bad98200681440cac67a6eb54612a6566370df3708429875572856eb09d848e2b4970c6951cf622b583c656e44667da9bc3c9ba0a08aa4949537eb13d8351d517c6c79df195d5e502ace12e8745584de27817a2484ce0c9eef23f38079bc2925b2527b7f70bab4718cab0a2a845a25fa6e7bcff85d12d7ceb5092e1e5ee09c11da2c4ca17d38682edd29ec2cbccd08778218fb433d3a1a64086e8368c99fbcdd2bc093cdc8f90a89fc81105e294fdefee11b5d8fc75210a76e0442295b9f908a4fb5fd63b5f326c9cb8ba8c39af115e8f3e4733647d38732c2b0c82cb1da01a2c2cdb893c9f80e20cfea8803bee8c40c5c630ac4a7e65556713b559ad5e1e28c97c4b785eb6cbd87a4d2535ac660aa6098f751bc65725f392bbfb98844ebe79a302e6f505505a510961e6955e992389a34414091b6e54b26e6c217cbda486c6215f682a4bd30035a852355924167a9826426f22054da60768a2c7ad127fadc507b53884a0b9f5ce3ed58ff07ba1a2d88ff2d926f63e5b3aa9780c6c9148757879e11458f09d545bc4aeb9fd90336f7f70297dc865b7a2b1d7f3491c786b26c7f9a683eac83b3f4079a356b2b35c850e6d51a7e2b519a80e34ac5bf580f98a97e28d0462bfb01f290e6a2ec6d357aa1bc18bb3409e4c7a8bd188f020055b14b744694747acde7ca16f2cc94f9d72f5b2eb5a4e08238c0fa069752fab68d0c74d25ef49d15a7e5b9b2651393e06f85d28a607a3b70f16b47ee98edcd59add15e107bfe770fea8ae5d3d6963db0de3822d0bba1b2b24b68839263a63c5c64076a9519425bb43799ed0c641a5a790723fedef4161f33199e77e61c8cb878ccfcea645be7265a3494a426f0f8e2c1e4ce513fc05b8b918da315b30b444409df02fde21f0c97e43fc5110be6fcee0a30923114c339b2e619ae69daf435fe770e218874637b76f5e4b9ca56eb911d051c0b919400148dc27b8f51e42a8db5e4e85eee02385099efe6060b0c8f54ef44b3349218f9f7c8a33dd3cfa79a14c14b4ed18b7be9655db1414df685e704bbbfce5e29ce8d41d8b1b4e84cd38475355d98940c87ee4872a87b4249f687a7b024066c0a55eebc836567b88c27b6a83def80000f213f5ddef0641835127a41b0684ac2ba51f5ee34bfe271bda8839ec2ef8bdfdae59d74357bab5988527ceca9fb442813c7f92307029b8def5f47b9b5305be9af95a2ac9c0ba0d6251bb870e77fd9765c825baca48ccd94ced0e6a98026accb69816d2fabe19732b4acd174992d9b189c3223609e4ec98aebf7cefec8c8529cf4460a45de6f171d09effe4ac840deb8a3ec9b559ccbcf452f558366634500f85b0de8895f9862d7733f3c2a946fff15e7ed30cbc0fcd499b0a38c551e04cb0bbb312a3f87d278828f199239edc58146c98e12c5ecb82c6d6a75b978cb42723bddc337ccee5b64a9efe608efa16b26e97be1a26d73c442fb2693bb4600bfbdb0eb322635e77f665a4873caa315726921bc28dd7467c3b80cd54da27d420519963700e6696802a7ad87b07517989a1fe70d8f8a7df66d3ba55f20a577a33707b8fb72bb9739afe8553f5472db9924b52d740f10dd1d8e77e7c5be0886c994503787d781d3bb8e16b367a466245a5f5ecf9b252220e2f7491ac417520ed1fd3506adb5757f15d5e7b7964f122878cfeb517ae95d2979f70e8e03257bb7c2943cc81cfed4c2b0d160746c204e6527471351381c68731aec3c778a7e8481337471fcf707fac7b0ffc2e6a5979f7b604e96fd1f7f6adc25a080e25d844f90b0fce609bb2c0989bbd072f6c35507d77ee84d03cfded8c48e69ebb68d1a73bdd489c914ebb3323c5c5acb4e07b6e8ab8ab4f450c8e42aefd824523501e3878cee6444f49ca58d3a25a810ae92bd515e3d10644264c542be1b1debf3800c26aa75312f2b6ffcd8fd2572b0859ce7c8569ba9a3110ee92f3ffca067747cf6fcb0ca1a25c54fb36deece81a6adfa3fffb8ef14570b897cc6b6929effd35beb432814e63e39b43899589c8d50d26d4104fb09152648cda6d97c82b063d716de09c859d3b99be61d95f93519ce33a9bc9663369b0b984b77ab784f7d652e4453cacf8bd3127cd2a64c1454b11ef0245cf31dafcf8c0e2e1b679815798aaedd73956844b3ea8b4329c4494c3dbd89d25bce17d08eb48af65782a6558b16a24c47bb6a1c7ee0a910b767375df0415ef6ca44082cd39fb1021b7ff23831f47cf1940b07b056c0b081f224b1c151a7e24f941c75516faa0e82af6b79f251167a244c351da0af4c41069b91311a80c7dada89fcc7159b1aaa0d11694cc2686dd719582dc81659598e44341e16bf63fab0e7479a1222343be1ed2c28d5b1878e7cfb9cbc42be08aa8e0c70e62fb9394c8783d003dbc333cd4cc93fb590c5d832b0f212b9a73211ce21ba893d122b6a05a32c89baa2ed0e002eabf6fab287ac0093f2b1435ff886d39270cc4a67066531cdd2ab77242eeaa2aea2f5c72e0b9ecce308766ac41be4d539c4a39b7d6dfc3121fef09c0d3830046574a0533d415acbc0af4d1291ab0d57d088ca193277b5ff82c29aace3b130cf19c5792b82239967ccdd7a4b787c9ecf97b8fce32ff2fb17991391106c554753df2febce4a51423404679e25cd713779663a8c38264a6548dacf2b23b305eeb31b20df601f9a063655f54e46d051dfaf065e3f4dc6a68db6758d0104b87d0aa922736e23f73b1199fc936fd388776729d8877b664d7dc23521394dfaf952224b0f544f2f014da42dcd93a97b780cf25f3c49a13cdb02765dce97ba685550d622dd0be9c83ab393df8299293985bc12d34fe219e5c9342d5afad3f16a32744f925d0e3683dc0606398cb816d48b0b6c2457e73c4d63bb5b7039250c7273da412ca2e09d1f1d2ed0d4470007b9f5e1f1cceb820a9a89560f8e747d46b1482db6a6a248344368b0dde343d58c6938b6c4ada2c0118d803342898c28d097fb4709adfeb31f94f8a97ca9f50da9f9542040d29709f4341b870fcc066035b5f55c26c16fbdbd338eb1610795218b953f31e697c3d38816bd0fdc642c203a5673a4f190b122dd3286f89a09a80a9908b40e3dbb2a159720e549e2f4e990b0e425f82175ac87f2f4599f943c5a6d6e6a9ba99e6452aae5804981147f075690719013279c6c4eb2edfe44704d7627c5837eaeaa6567112a00879eae43c7ca333c5cb9f8f4c07c0aee9750c3aa55979034283b1ede9ecdf4663c16528ebc5dbcf197bfd8b9ed969dcc133bee0c634bdeb3a484a963e72c1eb04b88347300d0baaaa703e11f77e17dbd213557a38026c0a6a9cf0149166f929b49cee1abb6ee4db1972359724f988740981e002592029295b3df1c4371a14e9d02f5da9ea8e6a9b7318525a547375d32767552d07c5473c76103b3f64a3ad6f0ab43b0e3ca2fcd6f476f01ff5c3dfe0a3a5677a841a76bb2d312748948ad050d248110341d391a055efb621deb16e3e172277de75b87b57d565d7187b038c0193fbee86e0c8590226f895cba84310b051a50b86974559c61c270c32dfaab9b79938cfbe5da782b7d018957cdd8d635223c9938aad6379ebcb3c4e2d07b3ce2576c5986e4e3a29289864a872d32edfdf6b3e0441f2266d834fe891e15028fd378cf8999bda41eb433047aa7866ed1f45964de67b70d290a4067b9d7310190c746f14f9052767290f21af9625e574df26fa150076e64ccc3d9bc0447b0598be5eafcf48f394a9e74066ff50bbf240fc16ccbd3ca229eaf9f9f982351102851d2e6898504c64dc205bcf518a9563e7f7d3fa08827f4b9579906260c1ca3bf6eca7e3e7de003d0123e67fadcbf723c6842feb7a12b0541c6326f259fcef927df4bff6981f48448913dabd97c1fe1456d6c4ecba0c67d90971bd0535520208e0d48c815f7b4e589aeac1005b4007450d8dd22712e95a3f07381df8c3f4481e270f61a6b1f8e213b861bc3b5d5398e586e313cf70095e051520c2d3225afd9d8186d4777c75f4c75b2d7694726268a64b57cd2bd40d60fe469a133e2afdf0f9899d17cf712222f81416566fa5fae98ad0c7f5e97b5fae5e906a6b82d38d7002c4cb32e86f4dfc4cb20be5a9895be3547f658f926ea00f2852951198b1858f3eb42bf0cf4ff47caf3595947a37943c8f1a50ef31ce02984ed0d68af8cf661bfc5d11ac70e8234dee3060831297f7e6c3c46ae629d3ea2720663a7f246172030138b0544f4913fd3eceb7d64f54a4515318412c174bb5170d8bb599fae8d736a1b1c5d17917c8491ac5e06633f55557d5d8c17831f8d9ff68cf5617f22793d492255e602a48162b3dd0a78dfdbee5c3097c6526842e906e9a9f1047121275deac7188870fbdf6fa165e2747cb68fe0340be31d88973031d4a112139ad90a532136002f105eb826b0880fe6a3bc3a7cb8e5cdbb0e1630bdf8661ffe192add302ad49063ebb81d9add877b902d03b4660aee2a42660fca13012aa354bde4b7abc0c41a6f2882bfa8a4103a5d5694339fc7c4e09b24eb"}, 0x1001) lseek(r0, 0x0, 0x4) 22:04:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000100)={&(0x7f0000001880)={0x14, 0x4, 0x400000000000006, 0xffffffffffffffff}, 0x14}}, 0x0) 22:04:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000940)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000000d00)}, 0xc100) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=':', 0x1}], 0x1, &(0x7f0000000280)}, 0x0) [ 541.429409] audit: type=1400 audit(1537308243.547:768): avc: denied { create } for pid=13901 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 541.598878] audit: type=1400 audit(1537308243.717:769): avc: denied { create } for pid=13901 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:04:04 executing program 4: sync() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='em0vboxnet0\\\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180), 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:04:04 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x14, 0x0, 0x0, @empty, "000000081e84d84b2db57b8a0af02ad8c4fda114"}}}}}, &(0x7f0000000080)) 22:04:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000280)={'sit0\x00', @ifru_data=&(0x7f0000000000)="6c1feed56cf3cdd3ebf45643f1f515a798a41c333bc63623ec4c7e22a4e5a846"}) 22:04:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000300)="040105000500000000000000ffb25bc202938207d903378c398d5375c5f73f2e55067d2780e1", 0x26, 0x0, &(0x7f00000002c0)={0xa, 0x100200004305, 0x800000000000d, @dev={0xfe, 0x80, [], 0x15}}, 0x1c) 22:04:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000140)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) dup2(r0, r1) 22:04:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x0, 0xffffffffffffff3f}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) write(r2, &(0x7f0000000800)="65cab0858cd9cdc0669d8f2ce6567650094401002d36b4944e96f123af1f92016c181ea9425be8c20f2a00000000000000005c07aced4b079b2d356763c8c800000000000000000000000000002ecd71caef6e47520aa311080e993c0e9d576d8b4df4cf20dcd9d3199e0d6c8f6113257b722f21f5ffdc8935bfd77b7994247484be48e29ee6a187cc56aafafbaa3dbfa20fa92442a8237ad7d3fce539f5a93f41208e0f8d1f07df1ca971ba7074fb6c23", 0xb1) 22:04:04 executing program 0: write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000340)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:04:04 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[]}}, 0x0) 22:04:04 executing program 2: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000800)=@rc, 0x80) getresgid(&(0x7f0000000a80), &(0x7f0000000940), &(0x7f0000000a40)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000680)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580), 0x24, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000006c0)=ANY=[], 0x0) getuid() syz_execute_func(&(0x7f0000000180)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a922c010164ac1e5d31a3b786e29845d9fe7f") 22:04:04 executing program 3: memfd_create(&(0x7f00000000c0)="736563757269748e00", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) 22:04:04 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x2d4}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000008ac0)={&(0x7f0000006900), 0xc, &(0x7f0000006980)={&(0x7f0000008a40)={0x14}, 0x14}}, 0x0) 22:04:05 executing program 5: fsync(0xffffffffffffffff) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) open(&(0x7f0000000780)='./file0\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000480)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000400)=ANY=[]) fstat(0xffffffffffffffff, &(0x7f0000000380)) stat(&(0x7f0000000400)='./file1\x00', &(0x7f00000004c0)) getgid() getgid() setgroups(0x0, &(0x7f0000000540)) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") [ 543.005488] audit: type=1400 audit(1537308245.127:770): avc: denied { create } for pid=13931 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 543.093872] audit: type=1400 audit(1537308245.217:771): avc: denied { write } for pid=13931 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 543.517087] audit: type=1400 audit(1537308245.637:772): avc: denied { read } for pid=13931 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:07 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000140)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getuid() ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:04:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000200)="87", 0x1) readv(r1, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/3, 0x3}], 0x1) 22:04:07 executing program 2: getgroups(0x294, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '/#-&trusted\\@]posix_acl_accesslo\x00'}, &(0x7f00000000c0)=""/196, 0xc4) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:04:07 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:04:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) pipe(&(0x7f0000000080)) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") ppoll(&(0x7f0000000040)=[{}], 0x2000000000000036, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000300), 0x8) 22:04:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/udp\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 22:04:07 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000680), 0x0, 0x0, &(0x7f0000000640), &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) epoll_create1(0x0) getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000840)=""/223) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) pivot_root(&(0x7f00000000c0)='./file0/../file0/file0\x00', &(0x7f00000005c0)='./file1\x00') truncate(&(0x7f00000002c0)='./file0/file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x330}, 0x7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000600)=0xe8) stat(&(0x7f0000000540)='./file0/../file0/file0\x00', &(0x7f0000000740)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000d40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) chown(&(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000004c0)=""/110, 0x6e) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0x14) finit_module(0xffffffffffffffff, &(0x7f0000000300)='/dev/ppp\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000007c0)='user\x00', &(0x7f0000000800), &(0x7f0000000a40), 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000006c0), 0x0) syz_execute_func(&(0x7f0000000cc0)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b07350691913d060600770fc4c2859304963d233d23410feefa633917660f38302f65f2420ee808000000450fa01af0442975e1c44379dfb9d6adbe90dfe2989fc4a2419b75d57f") 22:04:07 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x800}) 22:04:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_FD(r0, 0x1277, 0xffffffffffffffff) 22:04:08 executing program 5: getrandom(&(0x7f0000000140)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000080)="275ef362646576e67b656d3176626f786e6574312a2729656d30272c2800", 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000640)=""/153, 0x99}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000740)="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") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast}, &(0x7f0000000240)=0xc) sysinfo(&(0x7f0000000340)=""/127) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'rose0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) memfd_create(&(0x7f00000002c0)="68d903dad7726c", 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000280)={{0x2, 0x0, @multicast1}, {0x0, @random="694bd56c3e80"}, 0x0, {0x2, 0x0, @loopback}, 'bcsh0\x00'}) getpgid(0xffffffffffffffff) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 22:04:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000340)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 22:04:08 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) timerfd_gettime(r0, &(0x7f0000001040)) 22:04:09 executing program 1: symlink(&(0x7f0000000180)='\x00', &(0x7f0000000200)='./file0\x00') 22:04:10 executing program 4: gettid() getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioprio_get$pid(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) gettid() ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000780)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f00000003c0)) sched_setscheduler(0x0, 0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) sched_getaffinity(0x0, 0x8, &(0x7f0000000800)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) unshare(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000080)) getegid() 22:04:10 executing program 2: keyctl$set_reqkey_keyring(0x5, 0xffffffffffffffff) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) gettid() epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ustat(0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/pid\x00') signalfd(0xffffffffffffffff, &(0x7f0000000500), 0x18) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xfffffffffffffd03, 0x0) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 22:04:10 executing program 3: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='veth1_to_bridge\x00') getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:04:10 executing program 0: memfd_create(&(0x7f0000000000)='\x00', 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") socket$nl_netfilter(0x10, 0x3, 0xc) syz_execute_func(&(0x7f0000000400)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:04:10 executing program 1: add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 22:04:10 executing program 5: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000480)={0x0, 0x7530}) getrlimit(0x0, &(0x7f0000000240)) dup(0xffffffffffffff9c) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000500)=0x80) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000000c0)) mount(&(0x7f0000000400)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000340)="716e783600da486ce645a97fb6349467340c3acd4400fa19fecc73f6f761b676ed4ef72466b53bbd7d1df9228cd96f7ba482f7676737f4d6e48fedcdb2d262a8d2eb532088274d7ffbe8d8ede2c0887295c9752026c1629e611f8edf90b1f819b7cd", 0x0, &(0x7f00000003c0)='qnx6\x00') ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") creat(&(0x7f0000000180)='./file0\x00', 0x0) dup(0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f00000006c0)=@hci, &(0x7f00000001c0)=0x80) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000002e80)={0x0, 0x1, 0x6, @local}, 0x10) readv(0xffffffffffffffff, &(0x7f00000004c0), 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000740)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 22:04:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, &(0x7f0000000100), 0x20) [ 547.979811] audit: type=1400 audit(1537308250.097:773): avc: denied { create } for pid=14030 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 548.122048] audit: type=1400 audit(1537308250.237:774): avc: denied { create } for pid=14029 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:04:10 executing program 2: sync() ioprio_set$uid(0x0, 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000001c0)={{0x0, @dev, 0x0, 0x0, 'rr\x00'}, {@local}}, 0x44) pipe2(&(0x7f00000000c0), 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0610fef69dc26670f0fd59eeee5ee32ff0f0f0faa37b90f38211a8f6878c0f037c19086d9f28fc9410feefac421e572f1f0a6defb4175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") setgroups(0x0, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:04:10 executing program 0: prctl$intptr(0x8, 0x0) seccomp(0x100000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000080)) 22:04:10 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) read(r0, &(0x7f0000000000)=""/60, 0x3c) 22:04:10 executing program 2: prctl$setname(0xf, &(0x7f0000000180)='\x00') clock_gettime(0x0, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") [ 548.808078] audit: type=1400 audit(1537308250.927:775): avc: denied { create } for pid=14030 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:04:11 executing program 3: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:04:13 executing program 4: prctl$intptr(0x0, 0x0) clock_getres(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000080)) pipe(&(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400), &(0x7f0000000580)=0x10) gettid() init_module(&(0x7f00000004c0)='%]cgroup#selinuxem0/em1[\x00', 0x19, &(0x7f0000000500)='$,\x00') gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000017c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05f3af1a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501eee00885c4227992dd289f9f") 22:04:13 executing program 1: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 22:04:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000680)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000080)=ANY=[], &(0x7f00000002c0)=""/148, 0x94) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000140)) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000000200)='./file0/bus\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b21790e25e5e44135450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:04:13 executing program 3: mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:04:13 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x3a) getsockopt$inet6_int(r0, 0x29, 0x4d, &(0x7f0000000040), &(0x7f0000001380)=0x4) 22:04:13 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000d00), &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000940)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a064ae2989f") [ 551.137185] audit: type=1400 audit(1537308253.257:776): avc: denied { create } for pid=14084 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)=@hci, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000b80)}, 0x0) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x389756b1353683f6, 0x120, 0x0, 0xffffffffffffffeb) sendto$inet(r1, &(0x7f0000000040)="89", 0x1, 0x41, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) [ 551.233772] audit: type=1400 audit(1537308253.357:777): avc: denied { write } for pid=14084 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 551.533399] audit: type=1400 audit(1537308253.657:778): avc: denied { read } for pid=14084 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 551.932938] audit: type=1400 audit(1537308254.047:779): avc: denied { create } for pid=14084 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:14 executing program 3: readlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000001680)=""/4096, 0xfffffffffffffee6) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:14 executing program 1: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:04:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) fcntl$lock(r0, 0x11, &(0x7f0000000000)) 22:04:14 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2000000088) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x80) read(r0, &(0x7f0000000180)=""/180, 0xb4) sendto$inet(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20}, 0x10) [ 552.404497] audit: type=1400 audit(1537308254.527:780): avc: denied { create } for pid=14113 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:14 executing program 0: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969ef69dc00d9f0008f00008020c421da7fb43232233333183737660f3838d8c4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a140008000011f0802403088e9fa3c4033d5c160e4b") [ 552.542922] audit: type=1400 audit(1537308254.667:781): avc: denied { write } for pid=14113 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:17 executing program 3: creat(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000003c0)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) inotify_init() clock_gettime(0x0, &(0x7f0000000540)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000380)=ANY=[]) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000480)=""/161, 0xa1) socket$nl_route(0x10, 0x3, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U-', 0x4}, 0x28, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) pipe2$9p(&(0x7f0000000340), 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_execute_func(&(0x7f00000000c0)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410f33eefafa2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:04:17 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) dup(0xffffffffffffffff) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340), &(0x7f00000001c0)="1f706365737300", 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040), 0xa) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getuid() getegid() getpgrp(0x0) 22:04:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000009c0)={&(0x7f0000000280), 0xc, &(0x7f0000000980)={&(0x7f0000000900)=@bridge_delneigh={0x30, 0x1d, 0x29, 0x0, 0x0, {0xa}, [@NDA_DST_IPV6={0x14, 0x1, @loopback}]}, 0x30}}, 0x0) 22:04:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0), 0x8) 22:04:17 executing program 5: clock_getres(0x6, &(0x7f0000000180)) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000140)=ANY=[], 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000440)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f6445c1d1000f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfd8da3f") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @multicast2, @remote}, &(0x7f0000000380)=0xc) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000003c0)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/227, &(0x7f00000000c0)=0xe3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz0\x00'}, 0x45c) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), 0x14) 22:04:17 executing program 2: futex(&(0x7f0000000080), 0x3, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) clock_gettime(0x0, &(0x7f0000000200)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000001c0)}}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:04:17 executing program 1: clock_getres(0x5, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:17 executing program 0: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xfffffffffffffffe}, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:04:17 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x139, &(0x7f0000000080)}) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) keyctl$set_reqkey_keyring(0xb, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)) add_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240), &(0x7f00000005c0), 0x0, 0x0) clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:04:17 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) prctl$setptracer(0x59616d61, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') memfd_create(&(0x7f0000000400)='@mime_typecpuset\x00', 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:04:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300090e0000006fb43ced0000000005000600000000000a0000000000000004000000000000000000000000000000000000000000000002000100000000000000fb020000000005000500000000000a00000000000000ff0100000000000000000000000000010000000000000000"], 0x70}}, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x9, 0x2}, 0x10}}, 0x0) [ 555.878162] audit: type=1400 audit(1537308257.997:782): avc: denied { create } for pid=14145 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000003c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) shutdown(r1, 0x1) 22:04:18 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2715, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) [ 556.343617] audit: type=1400 audit(1537308258.467:783): avc: denied { create } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 556.585526] audit: type=1400 audit(1537308258.707:784): avc: denied { write } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.027021] audit: type=1400 audit(1537308259.147:785): avc: denied { read } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.153108] audit: type=1400 audit(1537308259.277:786): avc: denied { create } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.290948] audit: type=1400 audit(1537308259.407:787): avc: denied { create } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.354016] audit: type=1400 audit(1537308259.477:788): avc: denied { write } for pid=14176 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.873786] audit: type=1400 audit(1537308259.997:789): avc: denied { create } for pid=14214 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 557.900569] audit: type=1400 audit(1537308260.027:790): avc: denied { write } for pid=14214 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:20 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000400)=0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000500)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f00000004c0)=0xc) getuid() setreuid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:20 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x81ff) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) mlock(&(0x7f0000006000/0x3000)=nil, 0x3000) mlock(&(0x7f0000009000/0x1000)=nil, 0x1000) [ 557.973362] audit: type=1400 audit(1537308260.097:791): avc: denied { read } for pid=14214 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:20 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x1d7, &(0x7f0000000200)}) pipe2(&(0x7f0000000040), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) setuid(0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "af480ff4b1fe56f785c37208b486d88f21be9559b21b8a46b8d2724c6b45f19bfeec7432750b0cd94b646640b0de68058431384c692d4682b54f79292d5023c0", "b4b0bee58e6c5af5302622117caa5307254f4ed6a91cabc4d642c721fcd79953"}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @dev}, &(0x7f0000000840)=0xc) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000480)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x6e, [], 0x0, &(0x7f0000000180), &(0x7f00000001c0)=""/110}, &(0x7f00000002c0)=0x78) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da08abdbd38016dfa19fa762b4242218f8978972bf0817e768cc800008fa938951667670fbab204080000ca4b2178dae5e54175450d6ec2c46279db6752c4e1e1666f07368d7199") 22:04:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000002680), 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000540)=@ax25={0x3, {"5b78f007b1e2ee"}}, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:04:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f64009400050028925aa8000000000000008000f0ffffffff09000000fff5dd000000100001000b0c0c00fcff0000040e05a5", 0x58}], 0x1) 22:04:20 executing program 5: clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f0000000400), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:04:20 executing program 2: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r0, 0x0) 22:04:20 executing program 1: add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:04:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000240)={'teql0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000500)='westwood\x00', 0x9) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000200), 0x3) 22:04:21 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000140), &(0x7f0000013000)=0xb1) 22:04:21 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:04:21 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:04:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) shutdown(r0, 0x2) 22:04:23 executing program 2: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getgroups(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000ac0)="af8055a0596969ef69dc00d947f6d466410f60bad33f00007c2ac462193e7007afaf40f75e00437373a7c4a2f930b80e70714b660fc42608efc58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e698c402492c31") 22:04:23 executing program 1: clock_adjtime(0x0, &(0x7f0000000740)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) clock_gettime(0x0, &(0x7f0000000a80)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000880)={0x0, &(0x7f0000000840)}) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000540)) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)}}, 0x18) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@loopback}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getpid() creat(&(0x7f0000000200)='./file0\x00', 0x0) getpgid(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=""/216, 0xd8}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000005c0)) futimesat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', &(0x7f00000004c0)) getuid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000d00)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000180), 0xc, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[]}}, 0x0) set_tid_address(&(0x7f0000000b00)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/95) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000a00)="42805da0bd0fef69dc0f01eece73fec4427d5aa0bf000000380f1af3f0817e768cc8000058000000b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b771fb3602") 22:04:23 executing program 0: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") keyctl$update(0x2, 0x0, &(0x7f0000000300), 0xfffffdff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x298) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) 22:04:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f00000002c0)="00000000000000000000a49dc4a29db2025828f5830d93928fc9f6522efbb48d2b8fb7c64ac0962e427d9360108951eba08524a2efa31e7f5662a37bf179117ef2e09fbcb0ebda995049fb4864564cf677dde72e640ee56383d91ec238795bc734e472ef093aad7a2c26f32bfb6f2fbb5614cef252268528f05a2a3fd3401bf93d", &(0x7f0000000080), &(0x7f0000000400)="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", 0x16a, 0x0) 22:04:23 executing program 5: dup(0xffffffffffffff9c) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:04:23 executing program 3: unshare(0x2000400) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x3b0) [ 561.368894] audit_printk_skb: 12 callbacks suppressed [ 561.382021] audit: type=1400 audit(1537308263.487:796): avc: denied { read } for pid=14269 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 561.459875] audit: type=1400 audit(1537308263.577:797): avc: denied { read } for pid=14268 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:23 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) syz_execute_func(&(0x7f00000005c0)="c44279593745b105c401b4c22a00652ef2a566430f674f00c4817c533dc6cb0000470fdcd83e430f38035855670f381ed6660f3a222844") 22:04:23 executing program 3: clock_gettime(0xffffffffffffffff, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000240)="42805da0c3a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d3123b744dbe2440fc72326f00fbb9500000000") 22:04:24 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000080)=@nbd={'/dev/nbd'}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='affs\x00', 0x20000, &(0x7f00000001c0)='\x00') 22:04:24 executing program 0: syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) gettid() getpgid(0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000140)=0x80) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 562.054062] audit: type=1400 audit(1537308264.177:798): avc: denied { create } for pid=14269 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:24 executing program 1: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000500)={0x0, 0x1, 0x29e, @random="c5e26b7b74da"}, 0xfffffffffffffd99) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000e80)=ANY=[]) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d80)) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@dev, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000001000)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6, @in6=@local}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) [ 562.567490] proc: unrecognized mount option "./file0" or missing value 22:04:25 executing program 4: getpid() getpgrp(0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 22:04:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0xe6) 22:04:25 executing program 5: creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) times(&(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000680), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) connect(0xffffffffffffffff, &(0x7f0000000540)=@ax25={0x3, {"8b8a0f0f010572"}}, 0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/144, 0x90, 0x0, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 22:04:25 executing program 0: eventfd2(0x0, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffff9) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:04:25 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000440)=""/181, 0xb5) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f0000000200)=0x8) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9c421777c48ed69a179fbe5e5417545c4c3fbf049f90ec4010d64ac1e9a31a3b706e2989f4d0f6ec7") 22:04:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 22:04:26 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540), &(0x7f0000000b80)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') mmap(&(0x7f0000018000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000500)="677cf935c2000000450f16fa26440fef9ab13000008f487097a4520000000000c4a1f82ba2a0f434d8c422053ebf00008020c402f9acf5262644c07907b947c7f82d0c0000") 22:04:26 executing program 0: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 22:04:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20400) flistxattr(r1, &(0x7f00000001c0)=""/74, 0x4a) 22:04:26 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x3, 0x100000001) sendto$inet(r1, &(0x7f0000000380)='1B', 0x2, 0x2000c844, &(0x7f0000000200), 0x10) sendto$inet(r1, &(0x7f0000000080), 0xff45, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 22:04:26 executing program 5: unshare(0x20400) readahead(0xffffffffffffffff, 0x0, 0x0) 22:04:26 executing program 3: io_setup(0x1, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) fstat(0xffffffffffffff9c, &(0x7f0000000300)) setresuid(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:04:29 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4888, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 22:04:29 executing program 5: futex(&(0x7f0000000400), 0xb, 0x4, &(0x7f0000000280)={0x77359400}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000800)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:04:29 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000001c0)=""/80) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) r1 = gettid() tkill(r1, 0x15) 22:04:29 executing program 0: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f00000001c0)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) 22:04:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {}, 0x2a, {}, "6c6f00f1ffff04deffffffffffff0d00"}) 22:04:29 executing program 3: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) getpgrp(0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000004c0)) io_setup(0x0, &(0x7f0000000280)) prctl$getname(0x10, &(0x7f0000000200)=""/103) prctl$getreaper(0x0, &(0x7f0000000480)) getpgrp(0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000340)={'team_slave_1\x00'}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000006c0)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)) renameat2(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0) getpgrp(0x0) getpriority(0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f0000000480), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000640)={0x0, &(0x7f00000005c0)}) 22:04:29 executing program 1: keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000040)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) munlockall() clock_gettime(0x0, &(0x7f0000000400)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005200), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000500)="4000000c48f10756") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000005500)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$nl_xfrm(0x10, 0x3, 0x6) [ 567.365814] audit: type=1400 audit(1537308269.477:799): avc: denied { create } for pid=14395 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 567.482373] audit: type=1400 audit(1537308269.597:800): avc: denied { write } for pid=14395 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 567.533086] audit: type=1326 audit(1537308269.647:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14395 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf777fbe9 code=0x0 [ 567.727686] audit: type=1400 audit(1537308269.847:802): avc: denied { read } for pid=14395 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:29 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ppoll(&(0x7f00000005c0)=[{r0}], 0x1, &(0x7f0000000800)={0x0, 0x989680}, &(0x7f0000000840), 0x8) 22:04:30 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 22:04:30 executing program 3: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') getsockname$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @loopback}, &(0x7f0000000300)=0x10) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) nanosleep(&(0x7f0000000040), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000600)) fstat(0xffffffffffffffff, &(0x7f0000000680)) chown(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) sched_rr_get_interval(0x0, &(0x7f00000000c0)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a061f36ee9d92a5c41ff0f1837370f38211ac4c4829bdd2520200fee0a9d9d2179fbe5f541754566470f71d600c48179fcdf26bc2ebc0d641e5dc4e1e0120db80000007f") fcntl$getown(0xffffffffffffffff, 0x9) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000340), 0x10) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000200)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000003c0)}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:04:30 executing program 5: pselect6(0x40, &(0x7f0000000200), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000600)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000680)) futex(&(0x7f0000000380), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000400)=""/235) [ 568.137054] audit: type=1400 audit(1537308270.257:803): avc: denied { create } for pid=14395 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:30 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 22:04:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) getpid() accept4(0xffffffffffffffff, &(0x7f00000001c0)=@l2, &(0x7f0000000240)=0x80, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000600)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='bcsh0\x00'}) keyctl$session_to_parent(0x12) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9c40379634600004e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:04:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0xa70, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001100], 0x0, &(0x7f0000000000), &(0x7f0000001100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000001100000000000000000076657468315f746f5f626f6e6400000069705f76746930000000000000000000726f736530000000000000000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000000000000000000000000000000080900000809000040090000616d6f6e6700000000000000000000000000000000000000000000000000000038080000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000019000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ac1414bb000000006d616300000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000003000000000000000000626f6e645f736c6176655f300000000000000000000000000000000000000000726f736530000200000000000000000069706464703000000000000000000000e915b0505f73000000000000aaaaaaaaaaaa00000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0xac0) 22:04:31 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) 22:04:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffff8a1e5ec72e81b52d0000", 0x24) 22:04:31 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000140)=@abs, 0x6e) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000380)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000080)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000480)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$set_reqkey_keyring(0xe, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000005c0)) 22:04:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'team_slave_1\x00', &(0x7f00000000c0)=@ethtool_dump={0x43}}) 22:04:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x31, 0xffffffffffffffff, 0x0) unshare(0x400) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100"}) 22:04:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xc1, [], 0x0, &(0x7f0000000140), &(0x7f0000000280)=""/193}, &(0x7f0000000180)=0x78) [ 569.511666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 22:04:31 executing program 1: epoll_create1(0x0) epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:04:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000540)="ba02000000006a2eab1d9f7b", 0xc}], 0x1, &(0x7f00000007c0)}, 0x0) 22:04:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x7}) 22:04:32 executing program 5: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "44df41f9eeec013a1dc1f518ddddcf808f5393fdfab061b279ac4e285002bde670d37bc800ce10616363ab72572a7ab68c36b9d2eb54fa78e92bae8488dca6c5", "7a71778ed98d2906b9bace92cc0384c71d82f4482a618f59fe6c84a62feab824"}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) getuid() add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340), &(0x7f0000000440), 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580), &(0x7f00000005c0), 0x0, 0xfffffffffffffff9) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000800)={'broute\x00', 0x0, 0x0, 0xe1, [], 0x0, &(0x7f0000000680), &(0x7f0000000700)=""/225}, &(0x7f0000000880)=0x78) keyctl$search(0xa, 0x0, &(0x7f00000004c0)='id_resolver\x00', &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:04:34 executing program 4: socketpair$unix(0x1, 0x400000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x7156b1e93bb5b4df) dup2(r0, r1) 22:04:34 executing program 5: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc) clock_gettime(0x0, &(0x7f0000001680)) clock_gettime(0x0, &(0x7f0000000480)) clock_nanosleep(0x0, 0x0, &(0x7f0000000200), &(0x7f00000002c0)) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=""/35, &(0x7f0000000400)=0x23) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:04:34 executing program 3: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0x0) alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) request_key(&(0x7f0000000340)='.dead\x00', &(0x7f0000000380), &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0xfffffffffffffff8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000580), 0x10) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") lsetxattr$trusted_overlay_nlink(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)={'\v\x00', 0xf1c}, 0x28, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000700)) getpgid(0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000500)) wait4(0x0, &(0x7f0000000640), 0x0, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:04:34 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00004e8000)=[{&(0x7f0000004980)=';', 0x1}], 0x1, 0x0) write(r1, &(0x7f0000335000), 0xfc94) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0) 22:04:34 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) epoll_create(0x0) bind$inet(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000a00), 0x73c5d3417c1b93e7, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) 22:04:34 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0), 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@loopback}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)) socket$packet(0x11, 0x0, 0x300) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") 22:04:34 executing program 1: quotactl(0x480000101, 0x0, 0x0, &(0x7f0000000440)) 22:04:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 572.339103] audit: type=1326 audit(1537308274.457:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14487 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf77e5be9 code=0x0 22:04:34 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000400)=0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000500)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f00000004c0)=0xc) getuid() setreuid(0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000a40)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:34 executing program 2: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x11, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000001580)=0xffffffffffffffc4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000180), 0xc, &(0x7f0000001500)={&(0x7f00000015c0)={0x14}, 0x14}}, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000200)=@proc, 0xc) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)=""/4096, &(0x7f0000001480)=0x1000) bind$inet(0xffffffffffffffff, &(0x7f00000014c0)={0x2, 0x0, @remote}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 22:04:35 executing program 3: r0 = socket(0x1e, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x0, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001b6d7c980400000000f70dc136cb184a"}, 0x80) 22:04:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000014c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 573.997824] audit: type=1400 audit(1537308276.117:805): avc: denied { create } for pid=14515 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:36 executing program 4: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./'], 0x5) close(r0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000340)='\x00'], &(0x7f0000000000)) 22:04:36 executing program 2: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:04:36 executing program 5: unshare(0x600) timerfd_gettime(0xffffffffffffffff, &(0x7f00000000c0)) 22:04:36 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)={0x9}, 0x9) clock_getres(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:36 executing program 3: inotify_init1(0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:04:36 executing program 1: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 22:04:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) close(r0) 22:04:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x2) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000003000000003010000008001a00000000000000000000000000000000000000001ac142abb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 22:04:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000180)=0x3d, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="020300000700000000000000fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e065900854417e2bf3f8a0b3222a2bb42f2dbd94c3b50035110f118d0000f55dc62600009b00b47645004bae1356642490a7b5fc88046a0000000000000000000000", 0x6c, 0x0, &(0x7f0000000000)={0xa, 0x200810800, 0x20000000005, @remote}, 0x1c) 22:04:37 executing program 1: set_thread_area(&(0x7f0000000080)) nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) seccomp(0x0, 0x0, &(0x7f0000001ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00'}) syz_execute_func(&(0x7f0000000580)="c4223502621dc441f9512fdcf1e233c4635d7b3640420f050fae7000c4c1195c65bf64d828c4e1d5db347c") 22:04:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) close(r0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r0) 22:04:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") timer_create(0x0, 0x0, &(0x7f0000000080)) 22:04:38 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f00000008c0)='reiserfs\x00', 0x0, &(0x7f0000000900)) 22:04:38 executing program 2: r0 = memfd_create(&(0x7f0000000200)="885d292b00", 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) ftruncate(r0, 0xa00000) 22:04:38 executing program 3: inotify_init1(0x0) pipe(&(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="42805da0bd0fef69dc0f01eece49fe19987c7cfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:04:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) gettid() getpgrp(0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:04:38 executing program 5: r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000380)=""/17, 0x11) 22:04:38 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x208000, 0x0) pread64(r0, &(0x7f0000000040)=""/193, 0xc1, 0x0) 22:04:38 executing program 1: clock_gettime(0xfffffffffffffffe, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000440)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='lo.em1eth0trusted$\x00', 0x0) 22:04:38 executing program 2: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0xfffffffffffffc35, 0x0) seccomp(0x0, 0x0, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/22) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in=@broadcast}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getuid() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'veth1\x00', {0x2, 0x0, @multicast1}}) accept4$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @multicast2}, &(0x7f0000000740)=0x10, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 22:04:38 executing program 5: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") [ 576.893273] audit: type=1400 audit(1537308279.007:806): avc: denied { create } for pid=14611 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 577.111920] audit: type=1400 audit(1537308279.227:807): avc: denied { create } for pid=14613 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 577.122999] audit: type=1400 audit(1537308279.247:808): avc: denied { write } for pid=14611 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 577.164630] audit: type=1400 audit(1537308279.287:809): avc: denied { create } for pid=14613 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) sendmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000540)}}], 0x1, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/227, 0xe3}], 0x1) [ 577.400947] audit: type=1400 audit(1537308279.517:810): avc: denied { write } for pid=14613 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:39 executing program 0: clock_gettime(0x0, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="f9428055a0b4b48769ef61dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cfc4c10c96d9f28fc9410feefa4e2179fbe5a0a67565a675650cb30080ff99e9c4010d64ac1e5d33a3b7720bf080240308df63da") clock_gettime(0x0, &(0x7f0000000200)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000001c0)}}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500), 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000680)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") socket$inet6_udp(0xa, 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/207, 0x22a, 0x0, &(0x7f00000002c0)=@abs, 0x67) getpgrp(0xffffffffffffffff) [ 577.505722] audit: type=1400 audit(1537308279.627:811): avc: denied { write } for pid=14613 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 577.563269] audit: type=1400 audit(1537308279.687:812): avc: denied { read } for pid=14611 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 577.682005] audit: type=1400 audit(1537308279.797:813): avc: denied { create } for pid=14611 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:40 executing program 2: pipe(&(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) [ 577.840757] audit: type=1400 audit(1537308279.957:814): avc: denied { create } for pid=14613 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:41 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 22:04:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 22:04:41 executing program 5: ustat(0x0, &(0x7f0000000080)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, &(0x7f0000000040)}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)=""/53, &(0x7f0000000280)=0x35) 22:04:41 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x4202, r1, 0x0, 0x0) 22:04:41 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "79276f6e730a2366ae020837b0c013bfc09f16fc2f7aa3e50794c7d346c2226bbe9a7262c4a02c342bb021f32dff160ddbe2bc1dfced0f37ae65c9444ef84369b5f95618eb07a30f4a1275c141f2e829127a35e274d3e4d585e984dc8457369d12c6e4196f5a69482946e33cd3f195c165fbc2bc226d1d19e1d3c3dcb6234afd1e877554adea4b58cd63abf3e44963fc"}, 0x94) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='romfs\x00', 0x0, &(0x7f00000001c0)) 22:04:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='map_files\x00') getdents64(r0, &(0x7f0000000100)=""/28, 0x1c) getdents(r0, &(0x7f0000000200)=""/143, 0x29) 22:04:41 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001200)="aa", 0x1}], 0x1) read$FUSE(r0, &(0x7f0000000080), 0x1000) 22:04:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) unshare(0x400) vmsplice(r0, &(0x7f0000000580), 0x0, 0x0) 22:04:41 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={&(0x7f0000000040), 0xc, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="84000800000020d1fe161400ffffffff0000dffc0c00000000000000200000005b659a62290ffc380c2dbfdc5e9f13e1a04810ea64fbc3f4c1b4e2bf501fb1bb949869c2984d916d9f04005e4fcd4dd3050bc170061bdbc3080c91745ff958cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5040d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000380), 0x1c) 22:04:42 executing program 2: r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) fcntl$setstatus(r0, 0x4, 0x2800) syz_emit_ethernet(0x11, &(0x7f0000000240)={@empty=[0x2b], @random="1b207f5c5eeb", [], {@mpls_mc={0x8848, {[], @llc={@llc={0x0, 0x0, '1'}}}}}}, &(0x7f0000000000)) 22:04:42 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) fsync(r0) 22:04:42 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_adjtime(0x0, &(0x7f0000000700)) setrlimit(0x0, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0be6969ef69dc00d9ce41fb0f18373c370f38211a3dc19086d9c423317fac9300000000e9410feefa66420fc4f00ee5e5a07545ec9eec9ecec4011d64ac1e5d31a3b767e298c442ebf7377f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getegid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)) keyctl$join(0x1, &(0x7f0000000040)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000540)) preadv(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@rand_addr, @multicast1}, &(0x7f0000000140)=0xc) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, 0xc) fchmod(0xffffffffffffffff, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 22:04:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000280)="fc", 0x1, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/76, 0x4c}], 0x1, &(0x7f0000000400)=""/63, 0x3f}, 0x3) 22:04:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x9000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 22:04:43 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 22:04:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 22:04:43 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x621) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d3192b744db1ce2e2fb") 22:04:43 executing program 2: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100), &(0x7f0000000940), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) gettid() socket$unix(0x1, 0x0, 0x0) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000540)) rt_sigtimedwait(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000780), 0xffffffffffffff99) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) unshare(0x0) clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:04:43 executing program 0: perf_event_open(&(0x7f0000000400)={0x8, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:04:43 executing program 3: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58feb}]}) syz_execute_func(&(0x7f0000000680)="428055a03b1a1a69ef69dc00d9fbf3440f6f50e2692037370dc305bd060f38015d40a564a70f157a9e400f01efe5e5a2fd45c962050906002e660fe095000000003ef0f6585501410fa931a3b786e298dd3f227992dd289f410f0f8084170000ae") 22:04:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000080)=0xe0, 0x4) recvmmsg(r0, &(0x7f0000000880)=[{{&(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000300)=""/111, 0x6f}}], 0x1, 0x62, &(0x7f0000000940)) 22:04:44 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x621) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d3192b744db1ce2e2fb") [ 582.413764] audit_printk_skb: 3 callbacks suppressed [ 582.418901] audit: type=1400 audit(1537308284.537:816): avc: denied { create } for pid=14714 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:04:44 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000500)=0xc) get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000300)={&(0x7f00000000c0), 0x0, &(0x7f0000000380)={&(0x7f0000000140)}}, &(0x7f0000000340)=0x18) personality(0x0) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000a40)) getegid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40), &(0x7f0000000e80)=0xc) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f0000001300)='./file1\x00', &(0x7f0000001340)) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000014c0)={{{@in=@rand_addr, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000015c0)=0xe8) getgroups(0x0, &(0x7f0000001600)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001640)) getgroups(0x0, &(0x7f0000001700)) openat$cgroup(0xffffffffffffffff, &(0x7f0000001a80)='syz1\x00', 0x200002, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001dc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e00)={{{@in, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000001f00)=0xe8) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f0000001f40)) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)) getuid() getresgid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002180)) lstat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280), &(0x7f00000022c0)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000002300)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004880)) stat(&(0x7f00000048c0)='./file0\x00', &(0x7f0000004900)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d80)={{{@in=@multicast1, @in=@rand_addr}}, {{}, 0x0, @in=@local}}, &(0x7f0000004e80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:04:46 executing program 4: getrusage(0xfffffffffffffffc, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:04:46 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x5, 0xfffffffffffffffe}, 0x4) 22:04:46 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_execute_func(&(0x7f0000000800)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000340)) pipe(&(0x7f00000003c0)) socket$nl_netfilter(0x10, 0x3, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000740)="42805da0be480fef69dcdc01eece73fe19fa380f38211af338f0817e760fc80000000081b5e5bc2b0000002167f00fbab204000000cadae5e54175450f582e1a1a010d64ac1e5d31a3b74461b15252fb0703") 22:04:46 executing program 2: ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001d80)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x0) 22:04:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x3, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) 22:04:46 executing program 5: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0) io_setup(0x200, &(0x7f0000000340)=0x0) io_destroy(r0) 22:04:46 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000880)='./file0\x00', 0x8, 0x0) futex(&(0x7f0000000a40), 0x9, 0x0, &(0x7f00000009c0)={0x77359400}, &(0x7f0000000a00), 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getrandom(&(0x7f00000005c0)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0416969ef69dc0f01eec4670d722c3918378776f4c402bd0a9000000080c4c19086d9f28fc9410feefaa6e5e5417545430fa2c4010d64ac1e5d31a328b7b74379dfe7b9d6adbed0d0f3420f520c25130000007f") utimes(&(0x7f00000008c0)='./file0/file1\x00', &(0x7f0000000900)={{0x77359400}, {0x0, 0x7530}}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast1, @in6}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000000780)='numa_maps\x00') ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) quotactl(0x0, &(0x7f0000000340)='./file0/file0\x00', 0x0, &(0x7f0000000540)) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000480)=""/43) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000540)="e5099e6bafe525fde969a955edc950d8", 0x10) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000580)) getuid() clock_gettime(0x0, &(0x7f00000007c0)) syz_execute_func(&(0x7f0000000800)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") [ 584.202912] audit: type=1400 audit(1537308286.317:817): avc: denied { create } for pid=14763 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:04:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:04:46 executing program 0: futex(&(0x7f0000000080), 0x3, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) clock_gettime(0x0, &(0x7f0000000200)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000001c0)}}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") [ 584.323055] audit: type=1326 audit(1537308286.447:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=14763 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf77e5be9 code=0x0 22:04:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x12, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}}) 22:04:46 executing program 5: socket$unix(0x1, 0x2, 0x0) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e57aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:04:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000140)=0x2, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:04:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(r0, &(0x7f0000000180)=""/48, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/226, 0xe2) 22:04:48 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0xd0, &(0x7f0000000100)=""/66, &(0x7f0000000240)=0xfffffffffffffefe) 22:04:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='attr\x00') getdents(r0, &(0x7f0000001300)=""/151, 0xff0b) 22:04:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='io.weight\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x10) 22:04:48 executing program 1: unshare(0x20400) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000240)=""/33, 0x21, 0x0, &(0x7f0000000200), 0x10) 22:04:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x18, 0x0, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) close(r2) 22:04:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mlockall(0x1000000000000004) 22:04:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) 22:04:48 executing program 0: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000240)=0x80, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}}, 0x88) 22:04:48 executing program 5: add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da06d0fef69dc0f01eec4427d33ac12bb8000006c41fd0f2929410f3840e934030f38211ac403f96fd04dc19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:04:49 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) ptrace$getsig(0x4202, r1, 0x0, &(0x7f0000000000)) 22:04:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 22:04:50 executing program 4: umount2(&(0x7f00000008c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000040)={'\v\x00', 0xf1c}, 0x1a, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000006c0)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000800)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000840)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000b40)) getpgid(0xffffffffffffffff) getpgid(0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000500)) wait4(0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) io_setup(0x0, &(0x7f00000003c0)) io_destroy(0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000300)=""/94, &(0x7f0000000380)=0x5e) socket$packet(0x11, 0x0, 0x300) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 22:04:50 executing program 5: keyctl$set_reqkey_keyring(0xa, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @empty, @broadcast}, &(0x7f0000001100)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getresgid(&(0x7f00000002c0), &(0x7f0000000440), &(0x7f0000000480)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000003c0)=""/86) getgroups(0x5a, &(0x7f00000004c0)) fstat(0xffffffffffffff9c, &(0x7f0000000500)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getegid() getgroups(0x0, &(0x7f0000000580)) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000580)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0x134) fstat(0xffffffffffffffff, &(0x7f0000000340)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@mcast2}}, 0xe8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000540)={0x0, @speck128}) getpid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000500)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000680)=0x8) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 22:04:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f0000ddfffc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004c80)=[{{0x0, 0x40000, &(0x7f0000004b40), 0x36a, &(0x7f0000004bc0)}}], 0x31e9cd3487dc94, 0x0) 22:04:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000a00)=@known='system.sockprotoname\x00', &(0x7f0000000a40)=""/4096, 0x1000) 22:04:50 executing program 1: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0700000000000000ff3f03000000450001070000001419001a000400020007000a000200000800005d14a4e91ee438", 0x39}], 0x1) 22:04:50 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[], 0xe0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b1d632b010020000000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 22:04:50 executing program 3: pipe2(&(0x7f0000000040), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") [ 588.330835] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 588.387791] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 588.426484] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. [ 588.495397] audit: type=1400 audit(1537308290.617:819): avc: denied { create } for pid=14859 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 588.543600] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 588.569000] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 588.598932] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. [ 588.625240] audit: type=1400 audit(1537308290.747:820): avc: denied { write } for pid=14859 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:50 executing program 1: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410f48fa6b20784175452e1a5454f3a7c44379dfb9d6adbe90dfe298c4a27958c9ab") syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004400)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) lstat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) [ 588.715313] audit: type=1400 audit(1537308290.837:821): avc: denied { create } for pid=14872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 588.935845] audit: type=1400 audit(1537308291.057:822): avc: denied { write } for pid=14872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 589.025767] audit: type=1400 audit(1537308291.147:823): avc: denied { read } for pid=14859 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) recvfrom(r0, &(0x7f0000000080)=""/101, 0xffffffffffffffb9, 0x0, 0x0, 0x125) [ 589.354116] audit: type=1400 audit(1537308291.477:824): avc: denied { read } for pid=14872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:51 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 22:04:51 executing program 2: r0 = socket(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6tnl0\x00', 0x10) sendmmsg$unix(r0, &(0x7f0000001f40)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000440)="ab58", 0x2}], 0x1, &(0x7f0000000480)=[@rights={0x10}], 0x10}], 0x1, 0x0) [ 589.523715] audit: type=1400 audit(1537308291.647:825): avc: denied { create } for pid=14872 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) unshare(0x400) setsockopt(r0, 0x100000040000010e, 0x8, &(0x7f0000788fff), 0x0) 22:04:53 executing program 3: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) unshare(0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)=""/23, &(0x7f0000000200)=0x17) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000240)={'team_slave_0\x00', @ifru_addrs=@hci}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000140)='syz0\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") 22:04:53 executing program 0: munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) getrlimit(0x0, &(0x7f0000000540)) pipe2(&(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000680)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000980)=""/179, 0xb3}, 0x0) gettid() setpriority(0x0, 0x0, 0x0) getpgrp(0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000500)) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) rt_sigprocmask(0x0, &(0x7f0000000400), &(0x7f0000000440), 0x8) getpeername$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000180)=0x6e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/mnt\x00') ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) getpgrp(0xffffffffffffffff) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/50, 0x32) 22:04:53 executing program 5: ppoll(&(0x7f0000000280), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000180), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x2d6, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000600)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab2f0000000cac4e1057668d54cca670f38020a0f010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:04:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0xd49e}, 0x1c) 22:04:53 executing program 1: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000280)) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000440)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821da5c7d049b7d049b8cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:04:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fchmod(r1, 0x0) [ 591.619221] audit: type=1400 audit(1537308293.737:826): avc: denied { create } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 591.671890] audit: type=1400 audit(1537308293.787:827): avc: denied { create } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 591.864627] audit: type=1400 audit(1537308293.987:828): avc: denied { write } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:54 executing program 2: utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x77359400}}) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000500)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") [ 592.211405] audit: type=1400 audit(1537308294.327:829): avc: denied { read } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:54 executing program 3: getgroups(0x2, &(0x7f0000000200)=[0xee00, 0xffffffffffffffff]) setregid(0x0, r0) [ 592.349854] audit: type=1400 audit(1537308294.467:830): avc: denied { create } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 592.351171] audit: type=1400 audit(1537308294.467:831): avc: denied { create } for pid=14919 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:54 executing program 1: clock_gettime(0x8, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000000)) 22:04:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCFLSH(r0, 0x80047456, 0x706ffe) [ 592.506702] audit: type=1400 audit(1537308294.627:832): avc: denied { create } for pid=14917 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:04:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = epoll_create(0x7f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x40000009}) shutdown(r0, 0x0) epoll_pwait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x0, &(0x7f0000000100), 0x8) 22:04:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000340)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)='tunl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') 22:04:56 executing program 3: ioprio_set$pid(0x1, 0x0, 0x0) ioprio_get$pid(0x3, 0x0) 22:04:56 executing program 5: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) clock_getres(0x0, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) write$nbd(0xffffffffffffffff, &(0x7f0000000600), 0x10) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000180)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 22:04:56 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000001280)='dns_resolver\x00', &(0x7f00000019c0), &(0x7f0000001200)="83ee1d16097057f859736b0512211600f8209a4f11b3e9c462886f013b3fa1920002da3b3426eb456485770dfe35ab409ae3d2ef5ba01de9cf51bd92af9429da562c4120cdf798b5e4ff0f00", 0x4c, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/4096, 0xfffffdb9) 22:04:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000180), 0xf588b53c9c260e, 0x20408010) 22:04:56 executing program 1: syz_emit_ethernet(0x2c, &(0x7f0000000280)={@local, @local, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@broadcast, @current}, {@broadcast, @random="cbe749897d69"}}}}}, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000080), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000004c0)="428055a047f20838976999b069773dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291ac462edae0d00000000c4e14b2a492d5224f04008346d0000000000753241801b00c48295be146aa03333420f70942777c402c58c1cbe00e306476bff745c1e1f7f") 22:04:56 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00000005c0)=@nl, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)="5500000018007fbdb72d23b2a4a280930a0600fec0a8431491000000040008001a000500fec000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000640)}, 0x0) 22:04:56 executing program 2: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)={0xfc147812c6696263}) timerfd_settime(r3, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000ca0000)={0x2001}) epoll_pwait(r2, &(0x7f0000a1efac)=[{}], 0x1, 0x0, &(0x7f0000bbfff8), 0x8) 22:04:56 executing program 0: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mlock2(&(0x7f00007e0000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 22:04:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 594.468990] netlink: 25 bytes leftover after parsing attributes in process `syz-executor3'. 22:04:56 executing program 3: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:04:56 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000000180)}}, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000300)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") timer_getoverrun(0x0) memfd_create(&(0x7f0000000380)='security)\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0), 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:04:58 executing program 4: ppoll(&(0x7f0000000000), 0x117, &(0x7f0000000040), &(0x7f0000000500), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) dup(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) prctl$intptr(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="637007006363742e75736167655f757365720035cec651a08192cc6694a1414a857b522ed97a57360b9b02bd54b3fd8684dd7a73846af6f711f5015b00a34f6b04831a9c22ac0419d90b7ea87d822bd61e8de1fd31c88a4e31477a87ef06c92fdbaf2a0f032dcf942c96993fb1c6ab6aac8f5f", 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000400)={0x60}, 0x60) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000640)) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000140)=""/253) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000240), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() 22:04:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r0}, {r0}], 0x2, 0x10001) recvfrom$unix(r0, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f00000001c0)=@abs, 0x6e) shutdown(r0, 0x0) 22:04:58 executing program 0: memfd_create(&(0x7f0000000340)='\\\\\\cpusetproc!eth1\x00', 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), 0x0) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000000)) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 22:04:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x34000, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090c000000000000000000000002001300020000000000000000001800030006000000000002000000e0000001000002000000000002000100000000000000000200000000030005000000000002000000e00000010000000000000000"], 0x60}}, 0x0) 22:04:58 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregs(0xe, r1, 0x0, &(0x7f00000000c0)=""/38) 22:04:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0:\x00', 0x801}) 22:04:58 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x0) timer_create(0xfffffffffffffffb, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000044000)) getrandom(&(0x7f0000000540)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000040), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000001280)="812d00", 0x3, &(0x7f00000002c0)='&{,\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000001c0)={0x7, {0x6, 0x8, 0x8, 0x4, 0x5ee, 0x497a}}) syz_execute_func(&(0x7f0000000f80)="428055a03dcacaa3bcbcef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179678f38322fbae5e5e575450f2e1abe010d64ac165d31a3f5e29836e9470ff7c1e2") 22:04:58 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@setlink={0x2c, 0x13, 0x311, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xc}]}, 0x2c}}, 0x0) 22:04:58 executing program 1: nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000140)=""/19, 0x13) dup(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0)=""/139, 0x8b, 0x0, &(0x7f0000001ac0), 0x14) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) getegid() ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 22:04:58 executing program 2: getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000400)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) fstat(0xffffffffffffffff, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000440)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000580)=0xe8) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) geteuid() getegid() getgid() setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000680), 0x24, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:04:59 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='-1Q'], 0x3) 22:04:59 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xfffffffffffffffe) creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) rmdir(&(0x7f0000000080)='./file0/bus\x00') 22:05:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0xfffffffffffffffb) 22:05:01 executing program 5: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410f48fa6b20784175452e1a5454f3a7c44379dfb9d6adbe90dfe298c4a27958c9ab") syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) 22:05:01 executing program 0: clock_getres(0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000180), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) unshare(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@local, @in=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000840)=0xe8) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000c80)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") seccomp(0x0, 0x0, &(0x7f0000000100)) 22:05:01 executing program 1: futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000017c0)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000001e80), 0x88) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000001b40)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @loopback}}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000001c00)) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @remote, @local}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$9p(0xffffffffffffffff, &(0x7f00000003c0), 0x0) chroot(&(0x7f0000001c80)='./file0\x00') ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:05:01 executing program 3: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:01 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, &(0x7f00000004c0)=']#\x00') getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) setrlimit(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000380)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000500)) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:02 executing program 0: clock_getres(0x5, &(0x7f0000000280)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000140), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000340)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) socket$inet6(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 22:05:02 executing program 5: getrusage(0xfffffffffffffffd, &(0x7f00000001c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:05:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 22:05:02 executing program 1: pipe2(&(0x7f0000000200), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000640)) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)=ANY=[]) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) gettid() lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001940), &(0x7f0000001980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a00)={{{@in=@multicast1, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@loopback}}, &(0x7f0000001b00)=0x1e) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000005c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) lstat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002040)={{{@in6=@loopback, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000002140)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002180)) getpid() getresuid(&(0x7f0000000240), &(0x7f0000002240), &(0x7f0000000140)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000002300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:05:02 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fdinfo\x00') mkdirat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x1ff) 22:05:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000000080)=@ipv4_newroute={0x1c, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}, 0x1c}}, 0x0) 22:05:04 executing program 4: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:04 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0xb) 22:05:04 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 22:05:04 executing program 3: eventfd(0x0) socket$inet_udplite(0xa, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000540)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@multicast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) geteuid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e00)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001f00)=0xe8) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002800)=0xe8) getresgid(&(0x7f0000002840), &(0x7f0000002880), &(0x7f00000028c0)) getpgrp(0x0) geteuid() getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b21790f03bb8bb7c86abae5e5e575d3450f2e3e3e010d64ac1e0131a3b7e29873bb7f") 22:05:04 executing program 0: pselect6(0x210, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000ff8)={0x0, 0x989680}, &(0x7f0000000ff8)={&(0x7f00000000c0), 0x8}) 22:05:04 executing program 5: clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) clone(0x82502001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000500), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) dup(r0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f00000000c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 22:05:04 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) gettid() geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002880)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002980)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a00)) lstat(0xffffffffffffffff, &(0x7f0000002a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002b80)) stat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getpid() getresuid(&(0x7f0000006240), &(0x7f0000006280), &(0x7f00000062c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x1, [@remote]}, 0x14) 22:05:04 executing program 0: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000180)='veth1_to_team\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 22:05:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fb5ff0), 0x214) [ 602.611714] device lo entered promiscuous mode 22:05:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x1, 0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000080)=""/3, 0x3}], 0x1) 22:05:04 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(r0, 0x540b, 0x100000001) [ 603.820279] audit: type=1400 audit(1537308305.937:833): avc: denied { create } for pid=15180 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 603.845388] audit: type=1400 audit(1537308305.977:834): avc: denied { write } for pid=15180 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:06 executing program 4: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) io_setup(0x0, &(0x7f0000000280)) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000001540)}, &(0x7f0000000300)) pipe2$9p(&(0x7f0000000040), 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:05:06 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0xfffffffffffffdc2}}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000380)=""/152, 0x98}], 0x2, &(0x7f0000001040)=""/4096, 0x1000}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f000000000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400000000000117, 0x0) 22:05:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) [ 603.910039] audit: type=1400 audit(1537308306.027:835): avc: denied { read } for pid=15180 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:06 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000000), 0x1c) 22:05:06 executing program 2: keyctl$set_reqkey_keyring(0x10, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 22:05:06 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x0, 0x0, 0x17}) 22:05:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x9) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005e0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 22:05:06 executing program 5: keyctl$set_reqkey_keyring(0x2, 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000080)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:05:06 executing program 3: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'raw\x00'}, &(0x7f0000000480)=0x54) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000002c0)=""/148, 0x94) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f01fbab233000002ca6b21790e25e5e44135c4e229980557000000c4010d64ac1e5d31a3b74472e671fb0703") [ 604.506719] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=94 sclass=netlink_audit_socket [ 604.610574] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=94 sclass=netlink_audit_socket 22:05:06 executing program 0: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 22:05:07 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000200)) 22:05:07 executing program 5: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000580)='./file1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:08 executing program 4: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:05:08 executing program 5: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) seccomp(0x0, 0x0, &(0x7f0000000100)) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[], 0x0, 0x0) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ustat(0x0, &(0x7f0000000140)) getpgid(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)={'syz1'}, 0x4) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:05:08 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf401, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0x7, 0x3}}}}}, &(0x7f0000000040)) 22:05:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x5c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x48, 0x11, [@generic="e2abb4ec7645192056d52f76aacc17fd28d66a75a08d136f699d897bdabf4fd3c08e579e5253c2081c92cacb9693e7bb692f4ba15133ce6266b2a62bbacd9d21aa"]}]}, 0x5c}}, 0x0) 22:05:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x2, 0x1, 0x0, 0x2}, {0x6}]}) 22:05:08 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x210) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 606.662294] audit: type=1326 audit(1537308308.777:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15238 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf77cbbe9 code=0x0 [ 606.703725] audit: type=1400 audit(1537308308.827:837): avc: denied { create } for pid=15236 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:08 executing program 1: futex(&(0x7f0000000400), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) 22:05:08 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x1) setsockopt$inet_int(r0, 0x0, 0x400000000032, &(0x7f0000000040)=0x1000010, 0x4) 22:05:08 executing program 2: ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000240)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f00000002c0), 0x8) getpid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000300)={0x28}, 0x28) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) getsockopt$inet6_buf(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180)=""/40, &(0x7f0000001000)=0x28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f00000005c0)=0xc) getgid() fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000480)) setgroups(0x0, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000011c0)={{{@in=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") [ 606.740135] audit: type=1400 audit(1537308308.857:838): avc: denied { write } for pid=15236 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) shutdown(r1, 0x1) recvfrom(r1, &(0x7f0000000300)=""/101, 0xfffffdd7, 0x0, 0x0, 0x54fca8a0505bc126) recvfrom$inet(r1, &(0x7f0000000200)=""/179, 0xb3, 0x40000003, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x70a000) [ 606.848410] audit: type=1400 audit(1537308308.967:839): avc: denied { create } for pid=15236 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:09 executing program 0: rmdir(&(0x7f0000000280)='./file0\x00') unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) getgroups(0x0, &(0x7f0000000200)) setfsgid(0x0) pipe2(&(0x7f0000000200), 0x0) add_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000380), &(0x7f0000000540), 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000440)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400), 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000340)) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540), &(0x7f0000000740)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") 22:05:09 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000040), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x0, 0x0, 'rose0\x00', 'veth1_to_bridge\x00', 'team_sl\x00\r\x00\x00\x00\x00\x00\b\x00', 'dummy0\x00', @link_local, [], @broadcast, [], 0xb0, 0xb0, 0xe0, [@mark_m={'mark_m\x00', 0x18}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'veth1\x00', 'tunl0\x00', 'veth1_to_team\x00', 'vlan0\x00', @remote, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x240) 22:05:11 executing program 4: r0 = socket$inet(0x2, 0x803, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) getsockname(r0, &(0x7f00000036c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000003740)=0x80) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003780)={r1, @rand_addr, @dev}, 0xc) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0xe805, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x28}}}}}, &(0x7f0000000380)) 22:05:11 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@empty, @ipv4={[], [], @loopback}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1260302}) 22:05:11 executing program 5: unshare(0x20400) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x202042, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xba7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, r0, 0x0, 0xffffffffffffffff, 0x7) 22:05:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 22:05:11 executing program 2: epoll_create1(0x0) getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) 22:05:11 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), 0x4) 22:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000140)="0ccd80bfcdbdfb8b7761c1577655ffc6b525bd0a909ea894ef439fb1f48a7241a188ef222fcd401928b53888ca8d652aed8999a92ac35726a4795db58550a74df834cc91e740df8ac22a18d23a7daef6610291f2c1c9cb905830ad02e99bdd018ffa9f161270543141cf2e88f8628365934b8a69b07ca6ec0af5e17cc693359271aafb761102772fdbbeca940000000000000000", 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 22:05:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom$unix(r0, &(0x7f0000000240)=""/242, 0xf2, 0x40, &(0x7f0000000340)=@abs, 0x6e) 22:05:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000340), 0xa) 22:05:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000001700)) 22:05:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x40000000e, &(0x7f0000000300), 0x4) 22:05:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fcntl$dupfd(r0, 0x11, 0xffffffffffffffff) 22:05:13 executing program 4: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:05:13 executing program 3: futex(&(0x7f0000000480), 0xc, 0x0, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) getgroups(0x0, &(0x7f00000003c0)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) setgroups(0x0, &(0x7f00000006c0)) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000780)) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00'}, &(0x7f0000000180)=0x44) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getcwd(&(0x7f00000006c0)=""/146, 0xf1) 22:05:13 executing program 5: unshare(0x20400) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') fcntl$notify(r0, 0x402, 0x0) 22:05:13 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x100082) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000002c0), 0x12) r3 = memfd_create(&(0x7f0000000740)='GPLem1self\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, r3, &(0x7f0000000240), 0x20000102000007) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:05:13 executing program 0: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=ANY=[], &(0x7f0000000880)=""/42, 0x2a) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000940)={'teql0\x00'}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f00000006c0)={0x77359400}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:05:13 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000340)={'\x00', @ifru_addrs=@ethernet={0x0, @dev}}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:05:13 executing program 2: prctl$setname(0xf, &(0x7f0000000080)='keyringselinux-\x00') mknod(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x400000000058fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f00000003c0)=0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) io_setup(0x0, &(0x7f00000000c0)) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@mcast2, @in=@remote}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000780)={@mcast1}, &(0x7f00000007c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@local, @in=@loopback}}, {{}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@broadcast, @remote}, &(0x7f0000000ec0)=0x223) accept4$packet(0xffffffffffffffff, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e00)=0x14, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003580)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2}}, {{@in6=@remote}}}, &(0x7f0000003680)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000036c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003700)={@local, @multicast2}, &(0x7f0000003740)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000003780)=@xdp, &(0x7f0000003800)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003840)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000003940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003980)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000039c0)={0x0, @multicast1, @multicast2}, &(0x7f0000003a00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003a40)={{{@in6=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000003b40)=0xe8) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000003bc0)=@req={0x28, &(0x7f0000003b80)={'irlan0\x00', @ifru_addrs=@xdp}}) accept4$packet(0xffffffffffffffff, &(0x7f0000003c40), &(0x7f0000003c80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in=@loopback, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003dc0)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000004740)={&(0x7f0000000500), 0xc, &(0x7f0000004700)={&(0x7f0000003e00)={0x14}, 0x14}}, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8), 0x0, 0x8) memfd_create(&(0x7f0000000040)='/dev/ashmem\x00', 0x0) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/117, 0x75}], 0x35e) 22:05:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x40030074000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x2e, 0x119, 0x0, 0x0, {0x2}, [@nested={0x4}]}, 0x18}}, 0x0) 22:05:14 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000d00), &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000940)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a064ae2989f") 22:05:14 executing program 5: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000380)) getresgid(&(0x7f0000000240), &(0x7f0000000080), &(0x7f0000000200)) setregid(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000280)=""/107, 0x6b, 0x0, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f00)={{{@in=@loopback, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000001000)=0xe8) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000004c0)=""/85) socket$inet6_udplite(0xa, 0x2, 0x88) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:05:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000140)={0x18}, 0x18) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)) [ 612.432055] audit: type=1400 audit(1537308314.547:840): avc: denied { create } for pid=15358 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 612.525130] audit: type=1400 audit(1537308314.647:841): avc: denied { create } for pid=15362 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 612.641157] audit: type=1400 audit(1537308314.757:842): avc: denied { create } for pid=15358 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 612.730493] audit: type=1400 audit(1537308314.847:843): avc: denied { write } for pid=15362 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 613.239688] audit: type=1400 audit(1537308315.357:844): avc: denied { read } for pid=15362 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 613.341089] audit: type=1400 audit(1537308315.457:845): avc: denied { create } for pid=15362 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:16 executing program 4: keyctl$set_reqkey_keyring(0xa, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @empty, @broadcast}, &(0x7f0000001100)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000340)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getresgid(&(0x7f00000002c0), &(0x7f0000000440), &(0x7f0000000480)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000003c0)=""/86) getgroups(0x5a, &(0x7f00000004c0)) fstat(0xffffffffffffff9c, &(0x7f0000000500)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:16 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x40284504, &(0x7f0000000080)={0x7ffffd}) 22:05:16 executing program 1: keyctl$set_reqkey_keyring(0xf, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) 22:05:16 executing program 2: fsync(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000500)=""/193) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000003c0)=""/20) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f0000000300)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:05:16 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000002c0)={'bridge0\x00', {0x2, 0x0, @multicast2}}) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) clock_gettime(0x0, &(0x7f00000003c0)) syz_open_pts(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000340)}}, &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)=""/232, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x7, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066418955a4e088d557207c2a06c46129ef950000002140a564a70d157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") 22:05:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x405) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) sendto$inet6(r1, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r0) 22:05:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000180)=@ethtool_link_settings={0x4d}}) 22:05:16 executing program 2: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) unshare(0x20400) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 22:05:16 executing program 3: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000200)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getgroups(0x0, &(0x7f00000004c0)) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000380), &(0x7f00000003c0)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000240)) sysinfo(&(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000540), &(0x7f0000000600)=0x40) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)}) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') write$9p(0xffffffffffffffff, &(0x7f0000000140), 0x0) ptrace$peekuser(0x3, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpin6, &(0x7f0000000180)=0x80) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000440)=""/220) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000780), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[]) 22:05:16 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fstat(0xffffffffffffffff, &(0x7f0000000540)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) getgroups(0x0, &(0x7f0000000680)) 22:05:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 22:05:17 executing program 0: inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_execute_func(&(0x7f0000000240)="42805da0320fef6981dcdc01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541c4226198aa000800000f2e1ac481bd0e0e64ac3c5df2460f70fa847138fb0703") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) [ 614.985251] audit: type=1400 audit(1537308317.107:846): avc: denied { create } for pid=15414 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 615.071495] audit: type=1400 audit(1537308317.187:847): avc: denied { create } for pid=15414 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 615.145419] audit: type=1400 audit(1537308317.267:848): avc: denied { write } for pid=15414 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 615.527983] audit: type=1400 audit(1537308317.647:849): avc: denied { read } for pid=15414 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:19 executing program 4: clock_gettime(0x6, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fchmod(r0, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) clock_getres(0x0, &(0x7f00000002c0)) pipe(&(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) 22:05:19 executing program 1: getegid() ustat(0x0, &(0x7f0000000680)) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000700)={'U-', 0x3}, 0x28, 0x0) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0xffffffffffffff0b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8d000/0x8000)=nil, 0x8000, 0x1000, 0x0, &(0x7f0000d8f000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003740)={{{@in6=@mcast1, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000003840)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000038c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000003b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003bc0)=0x14) getsockname$packet(r0, &(0x7f0000003cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000003e40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003fc0)={{{@in, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000040c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004140)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000004180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000041c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004340)={0x0, @multicast1, @multicast2}, &(0x7f00000004c0)=0xfffffffffffffee5) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000043c0), &(0x7f0000004400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004440)={@dev}, &(0x7f0000004480)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000044c0)={@mcast2}, &(0x7f0000004500)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004ec0)={0x0, @rand_addr, @multicast2}, &(0x7f0000004f00)=0xc) accept4$packet(r0, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f80)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004fc0)={@loopback}, &(0x7f0000005000)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000005880)={&(0x7f00000003c0), 0xc, &(0x7f0000005840)={&(0x7f0000005040)={0x14}, 0x14}}, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000a40)=ANY=[]}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0), &(0x7f0000000600)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000640)={@local}, 0x14) keyctl$set_reqkey_keyring(0xe, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:19 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) 22:05:19 executing program 3: clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) recvmsg(0xffffffffffffff9c, &(0x7f0000000640)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/235, 0xeb}, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x4) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:05:19 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000001bff4)) signalfd(r0, &(0x7f0000392ff8), 0x8) 22:05:19 executing program 0: timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000300)) eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:05:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getpeername(r1, &(0x7f0000005ec0)=@can, &(0x7f0000005f40)=0x80) 22:05:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) tee(r0, 0xffffffffffffffff, 0x8, 0x0) 22:05:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xfffffffffffffffd}}, 0x50) 22:05:20 executing program 5: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x4) 22:05:20 executing program 0: setfsuid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) memfd_create(&(0x7f0000000640)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000004c0)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000600), 0x4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f00000005c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, 0x0, 0x0, 0x0) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:05:20 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{0x8}, {}, {}, {}], 0x2217) [ 618.853670] audit_printk_skb: 9 callbacks suppressed [ 618.858815] audit: type=1400 audit(1537308320.977:853): avc: denied { create } for pid=15446 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:22 executing program 5: unshare(0x4000000001fc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) dup(0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000480)={'sit0\x00', &(0x7f00000003c0)=@ethtool_perm_addr}) syz_open_procfs(0x0, &(0x7f0000012a80)='sched\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xc3) add_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1e) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") getuid() 22:05:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x9c}, {0x16}]}) 22:05:22 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', @ifru_data=&(0x7f0000000080)="ebee669509e69a73df9a3cb3e8c5a2b9a09ac88f9aaaa339e547ed92620a1e7a"}) 22:05:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) 22:05:22 executing program 1: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:05:22 executing program 2: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$nl_route(0x10, 0x3, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/ipc\x00') 22:05:22 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0xde009dff61c0d9f0) 22:05:22 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f00000002c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000a80)={0x20000000000000f1}) setrlimit(0x0, &(0x7f0000000200)) utime(&(0x7f0000000ac0)='.\x00', &(0x7f0000000b00)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000580)='./file1\x00', 0x0) request_key(&(0x7f0000000300)='dns_resolver\x00', &(0x7f0000000280), &(0x7f0000000540)='trusted.overlay.opaque\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000340)) eventfd(0x0) getuid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000500)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'U+', 0x3}, 0x28, 0x0) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe2(&(0x7f00000003c0), 0x0) getpgid(0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") pipe2(&(0x7f0000000080), 0x0) 22:05:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0), &(0x7f0000000100)="cc", 0x1, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) 22:05:23 executing program 5: unshare(0x400) syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) 22:05:23 executing program 2: sysinfo(&(0x7f0000000200)=""/121) eventfd2(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f00000006c0), 0x0, 0x0) setrlimit(0x0, &(0x7f0000000200)) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:05:23 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000600)=ANY=[@ANYRESHEX], 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000002c0)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0866969ef69dc00d9c4e1fb2caca2fd368f74c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{}, {0x77359400}}, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:05:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c40)={{{@in6=@mcast1, @in6=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001ec0)={0x0, @broadcast, @local}, &(0x7f0000001f00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002000)={@broadcast, @multicast2}, &(0x7f0000002040)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000020c0)=0x1bf) getsockname$packet(0xffffffffffffffff, &(0x7f00000022c0), &(0x7f0000002300)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002380)={0x0, @multicast1, @multicast2}, &(0x7f00000023c0)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000000080), 0xc, &(0x7f0000002800)={&(0x7f00000003c0)=ANY=[]}}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000680)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179450fec6bf5bae5e5e575450f2e1adfc4010d64ac1e5d31a3b7b74379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000540)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000004c0)={0x18}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=@gettaction={0x14}, 0x14}}, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') getresgid(&(0x7f0000000840), &(0x7f0000000440), &(0x7f0000000240)) getuid() finit_module(0xffffffffffffffff, &(0x7f0000000400)='police\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'bridge_slave_1\x00'}) getuid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) [ 623.088125] audit: type=1400 audit(1537308325.207:854): avc: denied { create } for pid=15544 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 623.143745] audit: type=1400 audit(1537308325.267:855): avc: denied { write } for pid=15544 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:25 executing program 4: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="6e65742f69636d700031a1d3b1e85a78e7ecbaa02fbc5fece8f91a7adb40ba43453bc1d471c47fb023b4244ec755107d15f22c5faf04270288b96b4c5a8e2504007eb6d66949f3ad42f80fe57736a67ba030dafef26efe5a1bbc5a06fe5e7d6836ce69a5") ioctl$FIBMAP(r0, 0x1, &(0x7f0000000340)) 22:05:25 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x4008080, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000500)="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", 0x59b}], 0x1, &(0x7f0000002680)}}], 0x1, 0x0) 22:05:25 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000002400)=""/4096) 22:05:25 executing program 1: sigaltstack(&(0x7f0000fef000/0x11000)=nil, &(0x7f0000000840)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000009c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:05:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000000), 0xc, &(0x7f000000e000)={&(0x7f00000016c0)={0x20, 0x1d, 0xffffffff0000000d, 0x0, 0x0, {0x7592da1f}, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @pid}]}]}, 0xfeaa}}, 0x0) 22:05:25 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000000)) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 22:05:25 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000580), 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) getpgid(0x0) timer_create(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000480), &(0x7f0000000500)}}, &(0x7f0000000600)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000080)) timer_getoverrun(0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}}}, &(0x7f00000006c0)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000880)=@xdp, 0x80, &(0x7f0000000ac0)}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b40)={@multicast2, @multicast2}, &(0x7f0000000b80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'gre0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0, &(0x7f0000001640)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000001880)=@xdp, &(0x7f0000001900)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@loopback, @in6=@dev}}, {{@in6}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d40)={{{@in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000001e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001fc0)={{{@in=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000020c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002100)={@dev}, &(0x7f0000002140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001940)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f460f75ce") [ 623.506098] audit: type=1400 audit(1537308325.627:856): avc: denied { create } for pid=15565 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 623.564785] audit: type=1400 audit(1537308325.687:857): avc: denied { create } for pid=15566 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:25 executing program 1: r0 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000040)={@rand_addr, @multicast1}, 0x8) [ 623.667130] audit: type=1400 audit(1537308325.787:858): avc: denied { create } for pid=15566 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:25 executing program 2: getpgrp(0xffffffffffffffff) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0xc) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000bc0)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000014c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004e00)=0xe8) getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004f40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000005040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080), &(0x7f00000050c0)=0xc) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005440)) fstat(0xffffffffffffffff, &(0x7f0000005480)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005500), &(0x7f0000005540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005580)) lstat(&(0x7f0000005600)='./file0/file0\x00', &(0x7f0000005640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007b40)) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008200), &(0x7f0000008240)=0xc) getresuid(&(0x7f0000008280), &(0x7f00000082c0), &(0x7f0000008300)) stat(&(0x7f0000008340)='./file0\x00', &(0x7f0000008380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:25 executing program 0: unshare(0x20400) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 22:05:25 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000001c0)) 22:05:26 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x2e40c0, 0x0) fcntl$setflags(r0, 0x2, 0x0) [ 624.025800] audit: type=1400 audit(1537308326.147:859): avc: denied { create } for pid=15580 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 624.210199] audit: type=1400 audit(1537308326.327:860): avc: denied { write } for pid=15580 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 624.628041] audit: type=1400 audit(1537308326.747:861): avc: denied { read } for pid=15580 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 624.744408] audit: type=1400 audit(1537308326.867:862): avc: denied { create } for pid=15580 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:05:27 executing program 4: clock_settime(0x0, &(0x7f0000000600)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:05:27 executing program 2: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:05:27 executing program 0: socket$inet6(0xa, 0x100004, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0be0fef699c0f01fecfc4e161763fd69d0fe00ff01af3f0817e768cc80000000081b5e5bc2b0000002167660f382a6b00641c7366776643d5c7a169e985fe5e000075450f2e1ac4010d64ac1e5d31a3b744dbe2c4a1c95fbf9222a25c0703") 22:05:27 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:05:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000500), 0xc, &(0x7f0000000540)={&(0x7f0000000040)=@ipv4_newroute={0x30, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_MULTIPATH={0xc}, @RTA_OIF={0x8}]}, 0xfe97}}, 0x0) 22:05:27 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x39, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 22:05:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000003b00)={&(0x7f0000000880)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VF_PORTS={0x4}]}, 0x2c}}, 0x0) 22:05:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80000000000041, &(0x7f0000000240)="261140cb96a2cf887028a2d87b7d9d5109900de8d9344fe3ab3c60427e039a9791fbcc7d9536ea16d7", 0x29) [ 625.937083] ================================================================== [ 625.944501] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 [ 625.950818] Read of size 1 at addr ffff8800b5a07afc by task syz-executor5/15634 [ 625.958267] [ 625.959899] CPU: 1 PID: 15634 Comm: syz-executor5 Not tainted 4.4.156+ #35 [ 625.966900] 0000000000000000 f08556d4511e06d6 ffff8800b5a079d8 ffffffff81a557bd [ 625.974950] ffffea0002d681c0 ffff8800b5a07afc 0000000000000000 ffff8800b5a07afc [ 625.983079] ffff8800b5a07be0 ffff8800b5a07a10 ffffffff8146c8c9 ffff8800b5a07afc [ 625.991126] Call Trace: [ 625.993711] [] dump_stack+0xc1/0x124 [ 625.999078] [] print_address_description+0x6c/0x217 [ 626.005764] [] kasan_report.cold.6+0x175/0x2f7 [ 626.011990] [] ? strlcpy+0x101/0x120 [ 626.017352] [] __asan_report_load1_noabort+0x14/0x20 [ 626.024124] [] strlcpy+0x101/0x120 [ 626.029329] [] xt_copy_counters_from_user+0x13e/0x2e0 [ 626.036168] [] ? xt_alloc_entry_offsets+0x60/0x60 [ 626.042676] [] ? mutex_lock_nested+0x629/0x840 [ 626.048905] [] do_add_counters+0x96/0x5c0 [ 626.054699] [] ? __do_replace+0x620/0x620 [ 626.060523] [] ? security_capable+0x94/0xc0 [ 626.066491] [] ? ns_capable_common+0x12a/0x150 [ 626.072748] [] compat_do_ip6t_set_ctl+0xd6/0x140 [ 626.079150] [] compat_nf_setsockopt+0x8b/0x130 [ 626.085378] [] ? compat_do_replace.isra.10+0x400/0x400 [ 626.092329] [] compat_ipv6_setsockopt+0x15d/0x1d0 [ 626.098816] [] inet_csk_compat_setsockopt+0x97/0x120 [ 626.105583] [] ? ipv6_setsockopt+0x130/0x130 [ 626.111645] [] compat_tcp_setsockopt+0x3d/0x70 [ 626.117894] [] compat_sock_common_setsockopt+0xb4/0x150 [ 626.124926] [] ? do_tcp_setsockopt.isra.5+0x1890/0x1890 [ 626.131939] [] compat_SyS_setsockopt+0x169/0x6e0 [ 626.138339] [] ? sock_common_setsockopt+0xe0/0xe0 [ 626.144828] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 626.151507] [] ? move_addr_to_kernel+0x50/0x50 [ 626.157755] [] ? do_fast_syscall_32+0xdb/0x8b0 [ 626.163981] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 626.170555] [] do_fast_syscall_32+0x31e/0x8b0 [ 626.176712] [] sysenter_flags_fixed+0xd/0x1a [ 626.182755] [ 626.184372] The buggy address belongs to the page: [ 626.189312] page:ffffea0002d681c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 626.197441] flags: 0x0() [ 626.200225] page dumped because: kasan: bad access detected [ 626.205923] [ 626.207535] Memory state around the buggy address: [ 626.212451] ffff8800b5a07980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 626.219824] ffff8800b5a07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 626.227169] >ffff8800b5a07a80: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 04 [ 626.234514] ^ [ 626.241774] ffff8800b5a07b00: f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 626.249124] ffff8800b5a07b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 [ 626.256467] ================================================================== [ 626.263809] Disabling lock debugging due to kernel taint 22:05:28 executing program 0: ioprio_get$pid(0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) gettid() ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000780)) syz_execute_func(&(0x7f00000001c0)="42805da0ca20a1a3ef69dc0f01ee0dce41cbff9191993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)) stat(&(0x7f00000002c0)='./file1\x00', &(0x7f00000003c0)) sched_setscheduler(0x0, 0x0, &(0x7f00000007c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000200)={0x20}, 0x20) unshare(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) 22:05:28 executing program 1: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540), &(0x7f0000000b80)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x0, 0x0, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') mmap(&(0x7f0000018000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000180)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) syz_execute_func(&(0x7f0000000500)="677cf935c2000000450f16fa26440fef9ab13000008f487097a4520000000000c4a1f82ba2a0f434d8c422053ebf00008020c402f9acf5262644c07907b947c7f82d0c0000") 22:05:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020e0000150000000002000000000000010018000000000008001200000003f0ff000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0xa8}}, 0x0) 22:05:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000680)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000231000)={@multicast2, @loopback, @loopback}, 0xc) [ 626.868482] Kernel panic - not syncing: panic_on_warn set ... [ 626.868482] [ 626.875888] CPU: 1 PID: 15634 Comm: syz-executor5 Tainted: G B 4.4.156+ #35 [ 626.884106] 0000000000000000 f08556d4511e06d6 ffff8800b5a07938 ffffffff81a557bd [ 626.892166] ffffffff82c4a3d9 0000000000000001 0000000000000000 ffff8800b5a07afc [ 626.900223] ffff8800b5a07be0 ffff8800b5a079f8 ffffffff8138af34 0000000041b58ab3 [ 626.908274] Call Trace: [ 626.910857] [] dump_stack+0xc1/0x124 [ 626.916218] [] panic+0x19e/0x359 [ 626.921230] [] ? add_taint.cold.4+0x16/0x16 [ 626.927196] [] ? preempt_schedule_common+0x22/0x60 [ 626.933768] [] ? preempt_schedule+0x25/0x30 [ 626.939737] [] ? ___preempt_schedule+0x12/0x14 [ 626.945967] [] kasan_end_report+0x47/0x4f [ 626.951774] [] kasan_report.cold.6+0x192/0x2f7 [ 626.958002] [] ? strlcpy+0x101/0x120 [ 626.963362] [] __asan_report_load1_noabort+0x14/0x20 [ 626.970136] [] strlcpy+0x101/0x120 [ 626.975324] [] xt_copy_counters_from_user+0x13e/0x2e0 [ 626.982153] [] ? xt_alloc_entry_offsets+0x60/0x60 [ 626.988640] [] ? mutex_lock_nested+0x629/0x840 [ 626.994861] [] do_add_counters+0x96/0x5c0 [ 627.000673] [] ? __do_replace+0x620/0x620 [ 627.006476] [] ? security_capable+0x94/0xc0 [ 627.012535] [] ? ns_capable_common+0x12a/0x150 [ 627.018764] [] compat_do_ip6t_set_ctl+0xd6/0x140 [ 627.025170] [] compat_nf_setsockopt+0x8b/0x130 [ 627.031399] [] ? compat_do_replace.isra.10+0x400/0x400 [ 627.038327] [] compat_ipv6_setsockopt+0x15d/0x1d0 [ 627.044820] [] inet_csk_compat_setsockopt+0x97/0x120 [ 627.051571] [] ? ipv6_setsockopt+0x130/0x130 [ 627.057653] [] compat_tcp_setsockopt+0x3d/0x70 [ 627.063878] [] compat_sock_common_setsockopt+0xb4/0x150 [ 627.070885] [] ? do_tcp_setsockopt.isra.5+0x1890/0x1890 [ 627.078247] [] compat_SyS_setsockopt+0x169/0x6e0 [ 627.084651] [] ? sock_common_setsockopt+0xe0/0xe0 [ 627.091141] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 627.097736] [] ? move_addr_to_kernel+0x50/0x50 [ 627.103966] [] ? do_fast_syscall_32+0xdb/0x8b0 [ 627.110196] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 627.116771] [] do_fast_syscall_32+0x31e/0x8b0 [ 627.122910] [] sysenter_flags_fixed+0xd/0x1a [ 627.129313] Kernel Offset: disabled [ 627.132929] Rebooting in 86400 seconds..