[....] Starting enhanced syslogd: rsyslogd[ 15.939436] audit: type=1400 audit(1574485087.388:4): avc: denied { syslog } for pid=1919 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.80' (ECDSA) to the list of known hosts. 2019/11/23 04:58:16 fuzzer started 2019/11/23 04:58:18 dialing manager at 10.128.0.26:41279 2019/11/23 04:58:18 syscalls: 1350 2019/11/23 04:58:18 code coverage: enabled 2019/11/23 04:58:18 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/11/23 04:58:18 extra coverage: extra coverage is not supported by the kernel 2019/11/23 04:58:18 setuid sandbox: enabled 2019/11/23 04:58:18 namespace sandbox: enabled 2019/11/23 04:58:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/23 04:58:18 fault injection: kernel does not have systematic fault injection support 2019/11/23 04:58:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/23 04:58:18 net packet injection: enabled 2019/11/23 04:58:18 net device setup: enabled 2019/11/23 04:58:18 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/23 04:58:18 devlink PCI setup: PCI device 0000:00:10.0 is not available 04:58:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad614", 0x57}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 04:58:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="413cdd4e", 0x4}], 0x1}}], 0x1, 0x0) 04:58:47 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) getpeername$inet(r0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0077a) 04:58:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000180)=""/11, 0xb) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000040)={0x15}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000140)) epoll_pwait(r3, &(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x2bc) r5 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000016) 04:58:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0036d) 04:58:47 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000000000019, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x199}, 0x80000000002100) syzkaller login: [ 56.246107] audit: type=1400 audit(1574485127.698:5): avc: denied { create } for pid=2103 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 56.293544] audit: type=1400 audit(1574485127.748:6): avc: denied { write } for pid=2103 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 56.335358] audit: type=1400 audit(1574485127.788:7): avc: denied { read } for pid=2103 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 04:58:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2d, &(0x7f00000002c0)=0x4880, 0x4) 04:58:48 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f00000001c0)='threaded\x00', 0x9) 04:58:48 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x2e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/110, 0x6e}], 0x1, 0x10400003) 04:58:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) lseek(0xffffffffffffff9c, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffd0c, 0x0, 0x0, 0x800e00a16) shutdown(r0, 0x0) 04:58:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:58:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="c09d"], 0x2) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 04:58:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)="04db9123ceac50df9f5a45dc4747ba1f47b90a593f0ec9289d2d71362f6ba52596f8e853c44fcce00c63058690d9f058f72d76747ac97863fb77dc1e4e08cd233fca24bba7e5849ffb437ef0ada169af26790ca323fc068c64c97ed68646cfe207e80e87917af561b1f4967d213b61eb254331ab6c50c8265ae5ac851c299399e090bdbcd6214e8d5e775d85cf2e525a", 0x90) 04:58:51 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00\x00\x00\x80\x00\x02\x00', @ifru_flags}) 04:58:51 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0x52, 0x0, 0x5b}}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f0000004f40), 0x3ffffffffffff80, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000013) 04:58:51 executing program 2: syz_emit_ethernet(0x33, &(0x7f0000000080)={@local, @empty=[0x2, 0x4, 0x1004788, 0x8035, 0x0, 0x100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x24}, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x2, 0x0, "e57044", 0x0, "cd98e8"}, "e4"}}}}}, 0x0) 04:58:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xb3) read(r0, &(0x7f0000000040)=""/11, 0xfffffcfb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 04:58:51 executing program 0: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000004c0)=@md5={0x1, "1a8541ce75187f13087cafcde1dd15b6"}, 0x11, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) linkat(r0, &(0x7f0000000440)='./file0\x00', r1, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x8000, 0x0) fchdir(0xffffffffffffffff) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) connect$unix(r0, &(0x7f0000000700)=@abs={0x0, 0x0, 0x4e20}, 0xffffffffffffffdd) r3 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x6100) ioctl$BLKSECTGET(r2, 0x1267, 0x0) fallocate(r0, 0x4, 0x35, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) lseek(0xffffffffffffffff, 0x20000010000, 0x2) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) ftruncate(r0, 0x0) 04:58:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 04:58:51 executing program 4: 04:58:51 executing program 2: 04:58:51 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f00000002c0)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x1c, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}]}}}}}}}}, 0x0) 04:58:51 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x28, 0x6, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x2, 0x0, 0x0, 0x0, {[@sack={0x5, 0x2}, @mss={0x2, 0x4}, @generic={0x0, 0xc, "b46815bb814d94ec4ee4"}]}}}}}}}}, 0x0) 04:58:51 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000000000002) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000005c0)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000240)) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/user\x00', 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000480)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:58:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r0, &(0x7f0000000200)=""/102400, 0xffffffffffffff1e, 0x300, 0x0, 0xffffffffffffff08) 04:58:51 executing program 5: 04:58:51 executing program 4: [ 59.807517] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. [ 59.815482] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 04:58:51 executing program 5: 04:58:52 executing program 1: 04:58:52 executing program 4: 04:58:52 executing program 3: 04:58:52 executing program 5: 04:58:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) recvfrom$inet(r0, &(0x7f0000000200)=""/102400, 0xffffffffffffff1e, 0x300, 0x0, 0xffffffffffffff08) 04:58:52 executing program 0: 04:58:52 executing program 4: 04:58:52 executing program 5: 04:58:52 executing program 1: 04:58:52 executing program 4: 04:58:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000000000019, &(0x7f0000000080)=0x5, 0x4) sendto$inet6(r1, 0x0, 0xfffffffffffffcb1, 0x0, &(0x7f0000000300)={0xa, 0x4e23}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x199}, 0x80000000002100) 04:58:52 executing program 3: 04:58:52 executing program 5: 04:58:52 executing program 4: 04:58:52 executing program 3: 04:58:52 executing program 1: 04:58:52 executing program 2: 04:58:52 executing program 0: 04:58:52 executing program 5: 04:58:52 executing program 3: 04:58:52 executing program 4: 04:58:52 executing program 1: 04:58:52 executing program 5: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='cmdline\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tkill(r1, 0x8000000000003b) fchdir(r0) r2 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x2) 04:58:52 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x20}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r2 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r2, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg(r1, &(0x7f00000092c0), 0x105, 0x0) 04:58:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xc, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) 04:58:52 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000540)={r0}) 04:58:52 executing program 0: 04:58:52 executing program 5: 04:58:52 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) accept4(r1, 0x0, 0x0, 0x0) shutdown(r1, 0x0) 04:58:52 executing program 4: fchdir(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000200)={0x77359400}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) 04:58:52 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) 04:58:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) 04:58:52 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr="44505de78ef7da3d4794f017fc0e2ae5"}, 0x1c) 04:58:52 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40049409, 0x0) 04:58:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r2, 0x26, &(0x7f0000000080)) fcntl$lock(r2, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x8000}) 04:58:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) mprotect(&(0x7f000001c000/0x2000)=nil, 0x2000, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 04:58:52 executing program 5: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000004c0)=@md5={0x1, "1a8541ce75187f13087cafcde1dd15b6"}, 0x11, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) connect$unix(r0, &(0x7f0000000700)=@abs={0x0, 0x0, 0x4e20}, 0xffffffffffffffdd) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(r4, 0x4, 0x6100) ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000540)) open(&(0x7f00000007c0)='./bus\x00', 0x650080, 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000340), 0x4) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) ftruncate(r0, 0x0) 04:58:52 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmmsg$sock(r0, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 04:58:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x2, 0x0, 0x0) 04:58:52 executing program 2: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xfffffffe) request_key(&(0x7f0000000500)='user\x00', 0x0, 0x0, 0xfffffffffffffffc) 04:58:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141442, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$FUSE_POLL(r2, &(0x7f0000000540)={0xbd5d038ae1e35a6}, 0x18) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x280080) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1}) [ 61.455264] [ 61.457028] ====================================================== [ 61.463428] [ INFO: possible circular locking dependency detected ] [ 61.469836] 4.4.174+ #17 Not tainted [ 61.473546] ------------------------------------------------------- [ 61.479957] syz-executor.5/2489 is trying to acquire lock: [ 61.485573] (sel_mutex){+.+.+.}, at: [] sel_read_policy+0x59/0x110 [ 61.494223] [ 61.494223] but task is already holding lock: [ 61.500923] (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 61.509680] [ 61.509680] which lock already depends on the new lock. [ 61.509680] [ 61.517991] [ 61.517991] the existing dependency chain (in reverse order) is: [ 61.527280] -> #4 (sb_writers#4){.+.+.+}: [ 61.533216] [] lock_acquire+0x15e/0x450 [ 61.540102] [] __sb_start_write+0x1af/0x310 [ 61.546825] [] ext4_lazyinit_thread+0x1e4/0x7b0 [ 61.553786] [] kthread+0x273/0x310 [ 61.559650] [] ret_from_fork+0x55/0x80 [ 61.565844] -> #3 (&eli->li_list_mtx){+.+...}: [ 61.571149] [] lock_acquire+0x15e/0x450 [ 61.577439] [] mutex_lock_nested+0xc1/0xb80 [ 61.584093] [] ext4_register_li_request+0x2fd/0x7d0 [ 61.591415] [] ext4_remount+0x1366/0x1b90 [ 61.597875] [] do_remount_sb2+0x41b/0x7a0 [ 61.604327] [] do_mount+0xfdb/0x2a40 [ 61.610329] [] SyS_mount+0x130/0x1d0 [ 61.616424] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 61.623664] -> #2 (&ext4_li_mtx){+.+.+.}: [ 61.628498] [] lock_acquire+0x15e/0x450 [ 61.634952] [] mutex_lock_nested+0xc1/0xb80 [ 61.641574] [] ext4_register_li_request+0x89/0x7d0 [ 61.648805] [] ext4_remount+0x1366/0x1b90 [ 61.655251] [] do_remount_sb2+0x41b/0x7a0 [ 61.661696] [] do_mount+0xfdb/0x2a40 [ 61.667702] [] SyS_mount+0x130/0x1d0 [ 61.673704] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 61.680930] -> #1 (&type->s_umount_key#34){++++++}: [ 61.686787] [] lock_acquire+0x15e/0x450 [ 61.693151] [] down_read+0x42/0x60 [ 61.698988] [] iterate_supers+0xe1/0x250 [ 61.705365] [] selinux_complete_init+0x2f/0x31 [ 61.713395] [] security_load_policy+0x69d/0x9c0 [ 61.721080] [] sel_write_load+0x175/0xf90 [ 61.727910] [] __vfs_write+0x116/0x3d0 [ 61.735777] [] vfs_write+0x182/0x4e0 [ 61.742067] [] SyS_write+0xdc/0x1c0 [ 61.749000] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 61.756692] -> #0 (sel_mutex){+.+.+.}: [ 61.762070] [] __lock_acquire+0x37d6/0x4f50 [ 61.769015] [] lock_acquire+0x15e/0x450 [ 61.775721] [] mutex_lock_nested+0xc1/0xb80 [ 61.783068] [] sel_read_policy+0x59/0x110 [ 61.791420] [] do_loop_readv_writev+0x148/0x1e0 [ 61.799322] [] do_readv_writev+0x573/0x6e0 [ 61.806066] [] vfs_readv+0x7a/0xb0 [ 61.811899] [] default_file_splice_read+0x3ac/0x8b0 [ 61.819190] [] do_splice_to+0xff/0x160 [ 61.825350] [] splice_direct_to_actor+0x249/0x850 [ 61.832469] [] do_splice_direct+0x1a5/0x260 [ 61.839064] [] do_sendfile+0x4ed/0xba0 [ 61.845333] [] compat_SyS_sendfile+0x144/0x160 [ 61.852293] [] do_fast_syscall_32+0x32d/0xa90 [ 61.859080] [] sysenter_flags_fixed+0xd/0x1a [ 61.865766] [ 61.865766] other info that might help us debug this: [ 61.865766] [ 61.874007] Chain exists of: sel_mutex --> &eli->li_list_mtx --> sb_writers#4 [ 61.882774] Possible unsafe locking scenario: [ 61.882774] [ 61.888814] CPU0 CPU1 [ 61.894419] ---- ---- [ 61.899096] lock(sb_writers#4); [ 61.902925] lock(&eli->li_list_mtx); [ 61.909568] lock(sb_writers#4); [ 61.915896] lock(sel_mutex); [ 61.919519] [ 61.919519] *** DEADLOCK *** [ 61.919519] [ 61.925567] 1 lock held by syz-executor.5/2489: [ 61.930423] #0: (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 61.939580] [ 61.939580] stack backtrace: [ 61.944061] CPU: 1 PID: 2489 Comm: syz-executor.5 Not tainted 4.4.174+ #17 04:58:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp\x00') read(r0, 0x0, 0x0) 04:58:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 04:58:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) [ 61.951178] 0000000000000000 af21d3e0a7886ae0 ffff8801d1e97020 ffffffff81aad1a1 [ 61.961418] ffffffff84057a80 ffff8800b4a8df00 ffffffff83ab8bd0 ffffffff83abc380 [ 61.969747] ffffffff83ac8080 ffff8801d1e97070 ffffffff813abcda ffffffff83e1f280 [ 61.979363] Call Trace: [ 61.983268] [] dump_stack+0xc1/0x120 [ 61.989763] [] print_circular_bug.cold+0x2f7/0x44e [ 61.997329] [] __lock_acquire+0x37d6/0x4f50 04:58:53 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x21, 0x0, &(0x7f0000000000)) [ 62.003403] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 62.009933] [] ? kasan_kmalloc.part.0+0x62/0xf0 [ 62.017370] [] ? trace_hardirqs_on+0x10/0x10 [ 62.023957] [] lock_acquire+0x15e/0x450 [ 62.029952] [] ? sel_read_policy+0x59/0x110 [ 62.037107] [] ? sel_read_policy+0x59/0x110 [ 62.043281] [] mutex_lock_nested+0xc1/0xb80 [ 62.049378] [] ? sel_read_policy+0x59/0x110 04:58:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) [ 62.055455] [] ? kasan_unpoison_shadow+0x35/0x50 [ 62.061890] [] ? fsnotify+0x85c/0x10c0 [ 62.067905] [] ? mutex_trylock+0x500/0x500 [ 62.074092] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 62.082854] [] ? rw_copy_check_uvector+0x221/0x2b0 [ 62.089643] [] ? __fsnotify_inode_delete+0x30/0x30 [ 62.097420] [] sel_read_policy+0x59/0x110 [ 62.103744] [] ? selinux_file_permission+0x2f5/0x450 [ 62.111027] [] do_loop_readv_writev+0x148/0x1e0 [ 62.117622] [] ? security_file_permission+0x91/0x1e0 [ 62.124384] [] ? sel_fill_super+0x6d0/0x6d0 [ 62.130366] [] ? sel_fill_super+0x6d0/0x6d0 [ 62.136809] [] do_readv_writev+0x573/0x6e0 [ 62.143354] [] ? vfs_write+0x4e0/0x4e0 [ 62.149104] [] ? check_preemption_disabled+0x3c/0x200 04:58:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) [ 62.156295] [] ? check_preemption_disabled+0x3c/0x200 [ 62.163144] [] ? __alloc_pages_direct_compact+0x220/0x220 [ 62.170821] [] vfs_readv+0x7a/0xb0 [ 62.177238] [] default_file_splice_read+0x3ac/0x8b0 [ 62.184794] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 62.192456] [] ? __module_text_address+0x13/0x140 [ 62.198981] [] ? is_module_text_address+0x2c/0x50 [ 62.205691] [] ? page_cache_pipe_buf_release+0x70/0x70 [ 62.212716] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 62.219500] [] ? save_stack_trace+0x26/0x50 [ 62.226025] [] ? kasan_kmalloc.part.0+0x62/0xf0 [ 62.232383] [] ? kasan_kmalloc+0xb7/0xd0 [ 62.238296] [] ? __kmalloc+0x141/0x330 [ 62.243853] [] ? alloc_pipe_info+0x339/0x420 [ 62.250204] [] ? splice_direct_to_actor+0x66e/0x850 [ 62.257137] [] ? do_splice_direct+0x1a5/0x260 [ 62.263477] [] ? do_sendfile+0x4ed/0xba0 [ 62.269542] [] ? compat_SyS_sendfile+0x144/0x160 [ 62.276913] [] ? do_fast_syscall_32+0x32d/0xa90 [ 62.283279] [] ? sysenter_flags_fixed+0xd/0x1a [ 62.289635] [] ? __schedule+0x7e3/0x1ee0 [ 62.295393] [] ? fsnotify+0x85c/0x10c0 [ 62.301144] [] ? preempt_schedule_common+0x41/0x70 [ 62.307850] [] ? security_file_permission+0x91/0x1e0 [ 62.314626] [] do_splice_to+0xff/0x160 [ 62.321222] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 62.328500] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 62.335711] [] splice_direct_to_actor+0x249/0x850 [ 62.342349] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 62.349147] [] ? do_splice_to+0x160/0x160 [ 62.354957] [] ? rw_verify_area+0x103/0x2f0 [ 62.361047] [] do_splice_direct+0x1a5/0x260 [ 62.367283] [] ? splice_direct_to_actor+0x850/0x850 [ 62.373957] [] ? rcu_read_lock_sched_held+0x10b/0x130 [ 62.381435] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 62.388011] [] ? __sb_start_write+0x14f/0x310 [ 62.394139] [] do_sendfile+0x4ed/0xba0 [ 62.400608] [] ? __compat_sys_pwritev64+0x170/0x170 [ 62.408717] [] ? compat_SyS_futex+0x1fb/0x2f0 [ 62.416510] [] ? __compat_put_timespec.isra.0+0xce/0x140 [ 62.424260] [] compat_SyS_sendfile+0x144/0x160 [ 62.431253] [] ? SyS_sendfile64+0x150/0x150 [ 62.437659] [] ? do_fast_syscall_32+0xd6/0xa90 [ 62.445561] [] ? SyS_sendfile64+0x150/0x150 [ 62.451975] [] do_fast_syscall_32+0x32d/0xa90 [ 62.458994] [] sysenter_flags_fixed+0xd/0x1a 04:58:54 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:58:54 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001102000000000000000000000800040003000000", 0x24) 04:58:54 executing program 4: socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000004c0)=@md5={0x1, "1a8541ce75187f13087cafcde1dd15b6"}, 0x11, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', r1, &(0x7f00000006c0)='./file0/file0\x00', 0x1400) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) fchdir(r2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) connect$unix(r0, 0x0, 0x0) r3 = creat(&(0x7f0000000a40)='./bus\x00', 0xa) fcntl$setstatus(r3, 0x4, 0x6100) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) lseek(r3, 0x20000010000, 0x2) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) ftruncate(r0, 0x0) 04:58:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) 04:58:54 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) 04:58:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='cmdline\x00') sendfile(r2, r3, 0x0, 0xedc0) 04:58:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:54 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73303a63313032332073797374656d5f75d452c355f39cc27a2228420704800000000000240ab296e5bf399ed464b9bb6eecb80100216279fb1956ca5ccb08bd8accb7ef49ed226a7c018d84a510c64287b81ffea42e7b690b47a694ce55d477d7dbf5f0df0900646edb74c818005ce6d5f512c123580e7e33e7c92c5954da4d611e4dbc54855b556ff1e4c0c0e30d840de973b995f147bcdcc35324a54b2e86b0f67dceb91a1f482c05be94ff471a549818f454b8adc200000000000000000000003b5a3e6191d003e0a78df443443c589970b12570e77e8863a2027d7855f4dca663f4101fe4a5ab9b5748ddf122edd8b329cd7f21a4c4a4e8dd6e01000000000000001011dd91951b1c8e9a08323bfe265f2bda6877292cc0a87ccfa9c13e4fb35700727ddde22b2181cadee69cb9d75f24d760ae34f4723305c67d2a7dd392dbc67328ad6469ffbfb7585cc80b7aa9ad905c0ecf95307910d65d19051cad964ee30affcc6820b16203a8035e0bb2a9647b5ff750a9c7282cf78c77700970bd9b96d649fae5b7228857b921c6a5677312041dc62005e0e783615ae205c2952db03bc2e4de648b3b8b9078"], 0x30) 04:58:54 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x100000198) utimes(&(0x7f00000000c0)='./bus\x00', 0x0) 04:58:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) 04:58:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 62.788366] audit: type=1400 audit(1574485134.238:8): avc: denied { create } for pid=2597 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 62.834567] audit: type=1400 audit(1574485134.288:9): avc: denied { bind } for pid=2597 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:58:54 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x8d65d62a614aabcf, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, 0x0) 04:58:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:57 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000480)=0x1) 04:58:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:57 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 2: write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:57 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x8d65d62a614aabcf, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, 0x0) 04:58:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind$netlink(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:58:57 executing program 2: write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:57 executing program 2: write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind$netlink(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:58:57 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:58:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind$netlink(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:58:57 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x8d65d62a614aabcf, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, 0x0) 04:59:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) 04:59:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:59:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:59:00 executing program 2: r0 = openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_user(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73303a63313032332073797374656d5f75d452c355f39cc27a2228420704800000000000240ab296e5bf399ed464b9bb6eecb80100216279fb1956ca5ccb08bd8accb7ef49ed226a7c018d84a510c64287b81ffea42e7b690b47a694ce55d477d7dbf5f0df0900646edb74c818005ce6d5f512c123580e7e33e7c92c5954da4d611e4dbc54855b556ff1e4c0c0e30d840de973b995f147bcdcc35324a54b2e86b0f67dceb91a1f482c05be94ff471a549818f454b8adc200000000000000000000003b5a3e6191d003e0a78df443443c589970b12570e77e8863a2027d7855f4dca663f4101fe4a5ab9b5748ddf122edd8b329cd7f21a4c4a4e8dd6e01000000000000001011dd91951b1c8e9a08323bfe265f2bda6877292cc0a87ccfa9c13e4fb35700727ddde22b2181cadee69cb9d75f24d760ae34f4723305c67d2a7dd392dbc67328ad6469ffbfb7585cc80b7aa9ad905c0ecf95307910d65d19051cad964ee30affcc6820b16203a8035e0bb2a9647b5ff750a9c7282cf78c77700970bd9b96d649fae5b7228857b921c6a5677312041dc62005e0e783615ae205c2952db03bc2e4de648b3b8b9078"], 0x30) 04:59:00 executing program 5: socket$inet6(0xa, 0x80003, 0xff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:59:00 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x8d65d62a614aabcf, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, 0x0) 04:59:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:59:00 executing program 2: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:59:00 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:59:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) 04:59:00 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:59:00 executing program 2: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x30) 04:59:00 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc) 04:59:00 executing program 2: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73303a63313032332073797374656d5f75d452c355f39cc27a2228420704800000000000240ab296e5bf399ed464b9bb6eecb80100216279fb1956ca5ccb08bd8accb7ef49ed226a7c018d84a510c64287b81ffea42e7b690b47a694ce55d477d7dbf5f0df0900646edb74c818005ce6d5f512c123580e7e33e7c92c5954da4d611e4dbc54855b556ff1e4c0c0e30d840de973b995f147bcdcc35324a54b2e86b0f67dceb91a1f482c05be94ff471a549818f454b8adc200000000000000000000003b5a3e6191d003e0a78df443443c589970b12570e77e8863a2027d7855f4dca663f4101fe4a5ab9b5748ddf122edd8b329cd7f21a4c4a4e8dd6e01000000000000001011dd91951b1c8e9a08323bfe265f2bda6877292cc0a87ccfa9c13e4fb35700727ddde22b2181cadee69cb9d75f24d760ae34f4723305c67d2a7dd392dbc67328ad6469ffbfb7585cc80b7aa9ad905c0ecf95307910d65d19051cad964ee30affcc6820b16203a8035e0bb2a9647b5ff750a9c7282cf78c77700970bd9b96d649fae5b7228857b921c6a5677312041dc62005e0e783615ae205c2952db03bc2e4de648b3b8b9078"], 0x30) 04:59:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) setxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='security.capability\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 04:59:00 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 04:59:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='\x04\x0fu\x00') write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)