open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000340)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x10000004}) prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) 23:52:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000340)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x10000004}) prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 524.638886] audit: type=1400 audit(1575244378.120:294): avc: denied { create } for pid=23454 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 524.947770] audit: type=1400 audit(1575244378.430:295): avc: denied { create } for pid=23462 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 525.402347] audit: type=1400 audit(1575244378.890:296): avc: denied { create } for pid=23478 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:52:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:52:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:52:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000340)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x10000004}) prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 527.050474] audit: type=1400 audit(1575244380.530:297): avc: denied { create } for pid=23508 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) [ 527.211352] audit: type=1400 audit(1575244380.700:298): avc: denied { create } for pid=23511 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:01 executing program 4: mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3) [ 528.027612] audit: type=1400 audit(1575244381.510:299): avc: denied { create } for pid=23527 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:01 executing program 4: uname(0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x26ed5e3a949825a1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6, 0x40010, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000340), 0x0, 0xb5b5a75d9a33160a}, 0x20) mkdir(0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'nr0\x01\x00', 0x703}) r2 = syz_open_procfs(0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x4a098759a734e669, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) r5 = accept4$inet(r2, &(0x7f0000000600)={0x2, 0x0, @multicast1}, &(0x7f0000000640)=0x10, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000680)=0x3f, 0x4) getsockname$packet(r4, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000000)={0x10000, 0xffffffff, 0x423, 0x8, 0x0, "7d2c30c654fb856e61cb9a667bedaca5153cc7", 0x7}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x300001, 0x0) write$FUSE_STATFS(r6, &(0x7f0000000140)={0x60, 0x0, 0x1, {{0x3, 0x5e80000000000000, 0x1, 0x5, 0x7, 0x1, 0x4, 0x9f6b}}}, 0x60) [ 528.601146] audit: type=1400 audit(1575244382.010:300): avc: denied { create } for pid=23530 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) [ 528.696760] audit: type=1400 audit(1575244382.180:301): avc: denied { create } for pid=23535 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 529.081712] audit: type=1400 audit(1575244382.570:302): avc: denied { create } for pid=23555 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x0, 0xf3aa, 0x3) 23:53:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x0, 0xf3aa, 0x3) [ 530.248205] audit: type=1400 audit(1575244383.730:303): avc: denied { create } for pid=23573 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) [ 530.306322] audit: type=1400 audit(1575244383.790:304): avc: denied { create } for pid=23574 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x0, 0xf3aa, 0x3) 23:53:04 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) [ 531.180602] audit: type=1400 audit(1575244384.660:305): avc: denied { create } for pid=23593 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:04 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000140)="d46fa7a0", 0x4, 0x0, 0x0, 0x0) 23:53:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x0, 0xf3aa, 0x3) 23:53:05 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) [ 531.847215] audit: type=1400 audit(1575244385.330:306): avc: denied { create } for pid=23605 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000280)=0x14) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r5, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r5, &(0x7f0000002dc0), 0x40000000000033e, 0x0) 23:53:05 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 23:53:05 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) 23:53:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000740)='\x00\x9aF\aM\xe0~\x1e5\t\xe7@\xe7\x1a\xb3#\x84\xd0g^\xb0\xe0L\xcd\x84/\xbcho\xdeq\xe4\xf5\x85\x18R\xef\xc8\x8bg\x7f~r\xc5\xde\r\x86\\g\xef-\x02\xa4\x94\xd6=+1\xbb\x8a\xde\xec\xfa&\xd6\"\xa9\x8c\xbctJ\v)!\x9c\x98\xa5\x9b\x8f\n\"\xa2h\xf44\xa3K<\xa9\x02\x87\xb6\xef\xcd\xe7\x12\xcf|5\xd3\xd4\r\xd6#1\xa7\xf7\x1a\x00\xb4\x16;\xa2\xab\xc6\xc1\xbd&\xc9\xf7u\xac\x0e\xfdP\xa2\x91\x86\xf9\xc8S/\x94\x93\xd2\fI\x1e\xa4>\xa3\x18\xddc\x95\x9an\nE\xedV\x06\x9cK\x0fO\xf8dV\xee\b\x80\xe8\xcf\x8f\'8\xb0\x03\x99s\xa0f\xb2\xeflgI\xe2\xad\xc0\x90\xff\a\xd75\x18\xdc\x9dva\xa1\xfc\xb9\xfe\xf2\xfcB\xfe\xb7\x06\x0eN\x13\xce\xfaQ\xf1\x9b\x15\xd0/sx\x97K2hz\x92~\xdd5$\x02\x12\xd5\xa6I>k\xa4\xb7\xaa\x95\a\x1f\x1f\xafd\xfd\xc2X>\bp&\xa6`3\"\x1fa\xdd*\x92d-C\x9cwJ\xbcE\xe8\xdf\x15\x01\x9b\xa1^f\xfb6\b\xd3\f.4\xa5\x17\x89\n\xb5\xb4\x7f\x97\xebnJB?\xdb\x9d\xe90k\xa9\xe7_[S\x9e\xbf\xf5~\xc6\xf6\xc8G+N\x1f\x1a\xb9<\xcaB^\xd2\x97\xf8\x0ej>p99-\x04\x9e(\x9b\xf3@yJj=\xde\xce\xa2', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) close(0xffffffffffffffff) [ 532.387008] audit: type=1400 audit(1575244385.870:307): avc: denied { create } for pid=23630 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:06 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) 23:53:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r0 = open(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r1, r1, &(0x7f0000000200), 0xa198) syz_genetlink_get_family_id$team(0x0) socket(0x100000000011, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @broadcast}, 0x17) r3 = socket(0x0, 0x2, 0x0) bind(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x4048060) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast2, @in6=@initdev}}, {{@in=@remote}, 0x0, @in6=@loopback}}, 0x0) r7 = syz_open_procfs(0x0, 0x0) lseek(r7, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x1) r8 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r8, 0x0, &(0x7f0000000200)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x80002, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(0x0) close(0xffffffffffffffff) open(0x0, 0x141042, 0x0) 23:53:07 executing program 0: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$int_in(0xffffffffffffffff, 0x5473, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdir(0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 23:53:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x5c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0x34f}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 23:53:07 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000000)) 23:53:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000002580), 0x132058) [ 534.103549] audit: type=1400 audit(1575244387.590:308): avc: denied { set_context_mgr } for pid=23690 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=0 23:53:07 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x5c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0x34f}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 23:53:07 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) symlink(&(0x7f0000000140)='..', &(0x7f0000000080)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00') [ 534.331369] binder: 23690:23695 ioctl 40046207 0 returned -13 23:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) pivot_root(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') 23:53:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x5c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0x34f}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 23:53:08 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x8000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 535.338933] audit: type=1400 audit(1575244388.820:309): avc: denied { create } for pid=23694 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:08 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) 23:53:09 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x5c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0x34f}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 23:53:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000002580), 0x132058) 23:53:09 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc50aaa17134b256e8a8ce50c74ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d61043c3c299e241aa7c3d71184549a2418c481a00dcc176f1717cd642efa9", @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a0798f84abe9c8c7336520420a108610d6a596a2a0e871f49a185a84f7e95bc3b1c50f6368c2"], 0x0, 0x12a}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:09 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:09 executing program 2: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "cef5e48fadbc6e88", "a4cee17392d28d313eaf1d8a89a2e438c96621261721aaf25ccbdecdd0a58717", "f1a3572f", "088f00"}, 0xfffffffffffffea7) io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412}) io_submit(r0, 0x477, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xff1a}]) 23:53:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x4, 0xfffeffff, 0x0, 0x899, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000180)={0x935, 0x7fffffff, 0xfff, 0x6, 0x564b}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) [ 536.719072] skbuff: bad partial csum: csum=36836/48301 len=3712 [ 536.897926] skbuff: bad partial csum: csum=36836/48301 len=3712 23:53:10 executing program 2: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "cef5e48fadbc6e88", "a4cee17392d28d313eaf1d8a89a2e438c96621261721aaf25ccbdecdd0a58717", "f1a3572f", "088f00"}, 0xfffffffffffffea7) io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412}) io_submit(r0, 0x477, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xff1a}]) 23:53:10 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000002580), 0x132058) 23:53:10 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 537.408364] skbuff: bad partial csum: csum=36836/48301 len=3712 23:53:11 executing program 2: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "cef5e48fadbc6e88", "a4cee17392d28d313eaf1d8a89a2e438c96621261721aaf25ccbdecdd0a58717", "f1a3572f", "088f00"}, 0xfffffffffffffea7) io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412}) io_submit(r0, 0x477, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xff1a}]) 23:53:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x4, 0xfffeffff, 0x0, 0x899, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000180)={0x935, 0x7fffffff, 0xfff, 0x6, 0x564b}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 23:53:11 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:11 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000000)='fuse\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:53:12 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc50aaa17134b256e8a8ce50c74ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d61043c3c299e241aa7c3d71184549a2418c481a00dcc176f1717cd642efa9", @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a0798f84abe9c8c7336520420a108610d6a596a2a0e871f49a185a84f7e95bc3b1c50f6368c2"], 0x0, 0x12a}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:12 executing program 2: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x303}, "cef5e48fadbc6e88", "a4cee17392d28d313eaf1d8a89a2e438c96621261721aaf25ccbdecdd0a58717", "f1a3572f", "088f00"}, 0xfffffffffffffea7) io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'teql0\x00', 0xd412}) io_submit(r0, 0x477, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xff1a}]) 23:53:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000002580), 0x132058) 23:53:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b700000001ed01edbfa30000000000000703000028feffff720af0fff8fffffe71a4f0ff0000000075000000010000003d400300000000005504000001ed000027000000000002001d44030000000000630a00fe000000001f00000000000000cf000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1b6a69b002e7f3be361917adee9ee1c8a2b4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd8dff0c710e4cdbf4fc41fbba4f94329e646b8ee6de2109fbe4ef154400e807d63cafa2438ec649dc74a1a610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda8a3658d42ecbf28bf6c76c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9dbae2460d0b11008e59a59fab9100eb53987ad1776e72ba7a54f0c33e63f4240ee3cd4d39000d06ad99edc3a6138d5fcfba53f8d0c67ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef928d236619074d6ebdf098bc908f523d228a40f9411fe7226a4040996e37c4f46756dfc1538ff7f0000279132d5ef8423116cbefaca6f46426000e8d3ac9d8f5a5557785d985a163458731f298d5140c9fe90dc66b257b0c0295afab36f353e1bc1574a6305790a25cdf085aa4192696ebbf416c0820e106e29d9654fce8ff4de960b344788b0ae6e1d41728a7b2014beddf3fbfa6082fbb36c8e235b4a2ea6c63adc3bf02d67b11f8fb0f64009fc03e060847a6c76f8601899040a539e6bd1035869070a4779af73a30046ae94930300000000000000200e2b6aed2c09a0bd454573d15ecda2148cf26b1748d5be4e85cbe6f6458f8861b92dc7caffa7c1b7520f5a60c7e7478b06825a91d7055e8032d060c61454e899b6e29b9f726de7653d5307c2102a38d48ebdc8c853400900b346e43e3637fde6e137d35267c37200001fe41c645f3b6fa9baebb3e42f648af9abba14b578f43b1aad90fe931cc77bc169a74da221ce280c149c1bc49fc422830747f99be5fd4e51f0c340d6fc8e6c7368f241cf9041c565969111210f75c4776d319be8a5d3378d493868614b79b2f24d3dd34dda6a931135244250610b3798cd644285d915e5f44391fea1bbf70bc92bf39e3d473c35669c381c695907199a46a5997f7ceaaada5c2d80de14beed0000000000000000000000000000008674ffcce972d887ac7a5ce64cf6e6b34824d2586bd0fa7d9dc57219a8ad632cf6e64b9afeedf9ee02b5a2c764cba092c4af8a4f8617a8511d8ae59d8d858c764c76f7996b483126bb7845dce2bae36bfbb8294d5bc1b396511bbdc134bd40c3e97896dc900eceaf3c380179a8c8f5bbd462ac0a03ec84bbf917f9a55851967dc9faf62011b069d4d760fb6dc7f48d1879473a4f6671e739f19c1ab865c4aa486ce1b1f57b1177a06eb10070e5c39880d9af2e43667024f2bda9b1df46071b2441094f2e7f92d67a4a36aa12d9edc12239629ebe5df52b8f35cd99a0afa678784bb9"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 23:53:12 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) [ 539.468257] audit: type=1400 audit(1575244392.950:310): avc: denied { prog_load } for pid=23876 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:53:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x4, 0xfffeffff, 0x0, 0x899, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000180)={0x935, 0x7fffffff, 0xfff, 0x6, 0x564b}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 23:53:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) lseek(r2, 0x12, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:53:13 executing program 2: inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:53:13 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) 23:53:13 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) [ 540.071024] audit: type=1400 audit(1575244393.550:311): avc: denied { syslog } for pid=23892 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:53:13 executing program 2: inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:53:13 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) [ 540.753169] audit: type=1400 audit(1575244394.240:312): avc: denied { syslog } for pid=23892 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:53:16 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc50aaa17134b256e8a8ce50c74ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d61043c3c299e241aa7c3d71184549a2418c481a00dcc176f1717cd642efa9", @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a0798f84abe9c8c7336520420a108610d6a596a2a0e871f49a185a84f7e95bc3b1c50f6368c2"], 0x0, 0x12a}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000380)={0x4, 0xfffeffff, 0x0, 0x899, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x18c, 0x1, 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000180)={0x935, 0x7fffffff, 0xfff, 0x6, 0x564b}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) 23:53:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) 23:53:16 executing program 2: inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:53:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) lseek(r2, 0x12, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:53:16 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) [ 542.725980] audit: type=1400 audit(1575244396.200:313): avc: denied { syslog } for pid=23917 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:53:16 executing program 2: inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000001cf, 0x0) 23:53:16 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) 23:53:16 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) 23:53:16 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc50aaa17134b256e8a8ce50c74ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d61043c3c299e241aa7c3d71184549a2418c481a00dcc176f1717cd642efa9", @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a0798f84abe9c8c7336520420a108610d6a596a2a0e871f49a185a84f7e95bc3b1c50f6368c2"], 0x0, 0x12a}, 0x20) tkill(r0, 0x3b) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:16 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="021380fa72b8dbc862dd50392f3017c053083f35f24dd768be625655f56a93126c23020000000002000000df250800120000000000000000ffffffff050000000900000001ac010000000000000000000000000000aaee7bb550075649e48881d17f3c0200c11a9b3924f84f460f633decddfd98b1d95994976fe96ccaf300a5a29e8ee909382bce938eae516a5d06551a59c483095d838105d027076d5113937b562b67f9df619075d6619a9d6e59c184f8233dbea6534c11c60dfa69906ac3de9b8cdef2ba983fff1409fe60dda1a3a704a6807184c69b5128ff71feed2e80ce14c0f7c86a657fc00200000000006ebe2bc0824c5b098e9b92b32a35619b49135765dce3ce15bcfe2242f161fae5eea2c4b6d667732ecbe6116cc2677af8e8cfd150138988542d01440d3941b24b161fd224b7145fb140bc46719ca2e1c34c654829f281e571341d3753f36ca4b94eb96d633a4675248dcac1bb73ebf33d1aa85e79aba72b13d2cf74ca711ab06bf6265fd37d600040ab54b4962d983d26660fcda17f6eeedeea470f599f499e8a7e17486b087b5c99979659d76fc58461d6df2f9b4a9d64491391d98005a59365b5c03bd176a007088cd3b7d663ec206d387386f003e5a31fad9beb036a12032e95836afb35189110c95316dfa321da070025f0c2dedda6645110e1f126f5b1b4ccd87495b338ebcd5fb8fbab76c404776c63f2ea0147283234b7293e35858685d79ea45394dcdbab3b55f6e00889ff09f45381c1d3b48def309c682a1a8c333144beb7902d819d0f1e40b86beb98458073e5eb6ab22adb29908e0bead584f35e44fde0d4a7d6bd7aad358c7299ae89e995a3620828a85d7adfda6d0acc72cf2d3360504e8c15080000000075b22f67071b2f14e5a9f27d269e4289c283372116c95a7558ac19eb91513063a5eb530e000000000000000000000b333b7965bbb597939f6dad42f7aba196978773b8c20d11d4005f9aeb385345def53f691baa49b48de9da9827cb81948bd93ed78c7e456bbe625852d03a3839a40ed40e0054ce126cc834bf84623fb924522bba3563ecc1030000000c362bea6eb19db7ef9c729fdbb8d594692fc056d6fed182344b1537b61ad349cc33b457bbf426a31c0bf8ea294141876f9301488917e82c8647bb7fefc7237d38813b726c15e96e606c3c9b40849452a46d5c126fab7520c08e66f46fa81074da0d0201a632832d105b82df862643128d42437937e4d2bd"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:16 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) 23:53:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) lseek(r2, 0x12, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:53:17 executing program 3: r0 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000680)={0x20000000}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 23:53:17 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 543.906035] audit: type=1400 audit(1575244397.390:314): avc: denied { syslog } for pid=23953 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:53:17 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0}) [ 544.027060] audit: type=1400 audit(1575244397.510:315): avc: denied { block_suspend } for pid=23958 comm="syz-executor.3" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 544.172028] audit: type=1400 audit(1575244397.650:316): avc: denied { create } for pid=23960 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/25) [ 544.445265] audit: type=1400 audit(1575244397.930:317): avc: denied { create } for pid=23960 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:18 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2, [{}, {}]}}) 23:53:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgroups(0x54b, &(0x7f0000000180)) lseek(r2, 0x12, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:53:18 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:18 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) [ 545.005408] audit: type=1400 audit(1575244398.480:318): avc: denied { syslog } for pid=23977 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 545.374476] audit: type=1400 audit(1575244398.860:319): avc: denied { create } for pid=23986 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 545.844073] syz-executor.4 (23989) used greatest stack depth: 21800 bytes left 23:53:19 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/25) 23:53:19 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2, [{}, {}]}}) 23:53:19 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:19 executing program 5: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:19 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:19 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2, [{}, {}]}}) 23:53:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/25) [ 546.478503] audit: type=1400 audit(1575244399.960:320): avc: denied { create } for pid=23996 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:20 executing program 0: r0 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2, [{}, {}]}}) 23:53:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000080)=""/25) 23:53:20 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:20 executing program 5: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:20 executing program 2: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:20 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:21 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001002, 0x0) chdir(&(0x7f0000000180)='./file0/file0\x00') mount$bpf(0x20000000, &(0x7f0000000300)='./file0\x00', 0x0, 0x5004, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 547.588620] audit: type=1400 audit(1575244401.070:321): avc: denied { create } for pid=24018 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 548.090566] audit: type=1400 audit(1575244401.570:322): avc: denied { create } for pid=24026 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 548.127878] audit: type=1400 audit(1575244401.610:323): avc: denied { associate } for pid=24033 comm="syz-executor.3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 23:53:21 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x1a, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r0, 0x0, 0x10001ff) [ 548.327978] audit: type=1400 audit(1575244401.810:324): avc: denied { associate } for pid=24033 comm="syz-executor.3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=0 23:53:22 executing program 4: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f00000005c0)={0x9, 0xff}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) eventfd2(0x1f, 0x1) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000240)) epoll_create1(0x0) socket$inet6_udplite(0xa, 0x2, 0x88) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={@loopback, @ipv4={[], [], @local}, @local, 0x0, 0x2, 0x0, 0x400}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000020000000}, 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:53:22 executing program 5: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:22 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed10000000000000006a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f7555636948295eb100000000000000075d2dd15b6210d53eed19bc0080000033270c6a98d91c22def1125d7b1e821039a85ad8b91cea336a1b57", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:53:22 executing program 1: vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x0, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000640)=0x1) r3 = inotify_init() lseek(r3, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) r4 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r4, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r8, 0x8915, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @empty}}) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={&(0x7f0000000600)='syz_tun\x00', r0}, 0x10) fcntl$dupfd(r7, 0x36df9bc77045c99b, r9) r10 = dup2(0xffffffffffffffff, r5) ioctl$TCSETSW(r10, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12}) getsockname(r10, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r11, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f0000000100)=0xffffffff80000001, 0x4) bind$inet(r11, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r11, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r11, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r12 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) ftruncate(r12, 0x2007fff) sendfile(r1, r12, 0x0, 0x8000fffffffe) 23:53:22 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x1a, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r0, 0x0, 0x10001ff) [ 549.214938] audit: type=1400 audit(1575244402.700:325): avc: denied { create } for pid=24049 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:22 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@abs={0x1}, 0x6e) 23:53:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) 23:53:23 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@abs={0x1}, 0x6e) 23:53:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x1a, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r0, 0x0, 0x10001ff) 23:53:23 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40048010}, 0x4000000) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ftruncate(r0, 0x48280) r4 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14}, 0xfffffff4) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 23:53:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:53:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) 23:53:23 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x1a, &(0x7f0000000180)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r0, 0x0, 0x10001ff) 23:53:23 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@abs={0x1}, 0x6e) 23:53:23 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) [ 550.529640] audit: type=1400 audit(1575244404.010:326): avc: denied { create } for pid=24082 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 23:53:24 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@abs={0x1}, 0x6e) 23:53:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:53:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt_cache\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) 23:53:25 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) 23:53:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x5, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 23:53:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0xfffffffffffffef8, 0xaa66a8da1ff9bb4b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x19, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r8 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r9 = dup2(r7, r8) r10 = getegid() ioctl$TUNSETGROUP(r9, 0x400454ce, r10) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) getegid() r11 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r11, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r12 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x0, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) dup2(r11, r12) r13 = getegid() getgroups(0x7, &(0x7f00000004c0)=[r10, 0xee00, 0xee01, 0xffffffffffffffff, r13, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000580)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="e8000000000008002cbd7000ffdbdf25a4000d0008000d00", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x4}], 0x1, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r14}}}], 0x68, 0x40}, 0x18080) 23:53:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:53:25 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:25 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) [ 552.083010] audit: type=1400 audit(1575244405.560:327): avc: denied { prog_load } for pid=24128 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 552.229095] audit: type=1400 audit(1575244405.710:328): avc: denied { prog_load } for pid=24128 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:53:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0xfffffffffffffef8, 0xaa66a8da1ff9bb4b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x19, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r8 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r9 = dup2(r7, r8) r10 = getegid() ioctl$TUNSETGROUP(r9, 0x400454ce, r10) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) getegid() r11 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r11, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r12 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x0, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) dup2(r11, r12) r13 = getegid() getgroups(0x7, &(0x7f00000004c0)=[r10, 0xee00, 0xee01, 0xffffffffffffffff, r13, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000580)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="e8000000000008002cbd7000ffdbdf25a4000d0008000d00", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x4}], 0x1, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r14}}}], 0x68, 0x40}, 0x18080) 23:53:26 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:53:27 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:27 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0xfffffffffffffef8, 0xaa66a8da1ff9bb4b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x19, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r8 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r9 = dup2(r7, r8) r10 = getegid() ioctl$TUNSETGROUP(r9, 0x400454ce, r10) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) getegid() r11 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r11, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r12 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x0, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) dup2(r11, r12) r13 = getegid() getgroups(0x7, &(0x7f00000004c0)=[r10, 0xee00, 0xee01, 0xffffffffffffffff, r13, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000580)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="e8000000000008002cbd7000ffdbdf25a4000d0008000d00", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x4}], 0x1, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r14}}}], 0x68, 0x40}, 0x18080) 23:53:27 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:29 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x318}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0xfffffffffffffef8, 0xaa66a8da1ff9bb4b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x19, 0x0, &(0x7f0000000040)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000300)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@local, @in6}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) r7 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r7, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r8 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r9 = dup2(r7, r8) r10 = getegid() ioctl$TUNSETGROUP(r9, 0x400454ce, r10) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) getegid() r11 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r11, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r12 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x0, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) dup2(r11, r12) r13 = getegid() getgroups(0x7, &(0x7f00000004c0)=[r10, 0xee00, 0xee01, 0xffffffffffffffff, r13, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000580)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="e8000000000008002cbd7000ffdbdf25a4000d0008000d00", @ANYRES32=0x0, @ANYBLOB, @ANYRES32], 0x4}], 0x1, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r6, r14}}}], 0x68, 0x40}, 0x18080) 23:53:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:30 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:30 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:31 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) creat(0x0, 0x0) io_submit(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000013c0)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 23:53:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e3dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000bfcffc), &(0x7f0000000140)=0x72) 23:53:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_pts(r0, 0x0) dup2(r1, r2) 23:53:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = dup(r4) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x4) socket$nl_xfrm(0x10, 0x3, 0x6) 23:53:31 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:31 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e3dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000bfcffc), &(0x7f0000000140)=0x72) 23:53:32 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:32 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e3dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000bfcffc), &(0x7f0000000140)=0x72) 23:53:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:53:32 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:33 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) creat(0x0, 0x0) io_submit(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000013c0)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 23:53:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e3dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x7, &(0x7f0000bfcffc), &(0x7f0000000140)=0x72) 23:53:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000000)={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00082, r8}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f0000000000)={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c00082, r12}) 23:53:33 executing program 2: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000240)=@ethtool_regs}) 23:53:33 executing program 1: setgroups(0x2, &(0x7f0000000280)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000000700)=[0x0, 0x0]) 23:53:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:53:34 executing program 1: setgroups(0x2, &(0x7f0000000280)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000000700)=[0x0, 0x0]) 23:53:34 executing program 2: clock_gettime(0x80000003, 0x0) 23:53:34 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000010000002d640500000000006504040001f7ffff0304000001007d60b7030000000000006a0a00fe0000000085000000150000009400000000000000951d9000000000005d4ad210ba2334ef7488be097dbdc99faf24365628ad2de08531377a274d96263d4345d45d359e7028304fd0e49e66111b7bc645964764aadc57d484f66a1f4aa595507110cbede0c0ea470c9b064fd6011ffb767072fd8632625d287eb56d87d187be243415640ab25ff98b129f860f6e98cbf809bd6c598d99dc33efae91e1800f22aadbfb22443b6eb6c86f03d6026fe31e4b9658e05aaede7cdbe0a55f5de9dbad9d2c212ac178ef56fbbaead6d3ebfd4ca1b993b95473e855d6b4869fc9b2c511af3056e21500000000000000005af504c436f9e16f95c126bf96d4f83df228cba24018c0ad0209001c44b9ab10965f385bcb3ee99124f26256620a07338d51c1d54a8dc3834502c35b4b0fbf1e975870f0f3eb8f94fa24966fa7878a5c19ffb7bb60960f5336b72aa2a6d543ed354e93372e16072f83be600ad8feeceabf1c30c6d42e6b57a51def2b0be03fee292dca8f76891dc19bd857d2a43bacbd3bbbfab8d6596ed95a50e7b9a3999b49d00ab0b9190a0c71baa229d28481847e4af280680452cf0a252779edb0251c761ca225597c17a32f358fd7b58a1787ea104c4b63523289ece4e485eee8fb3ae06619993343fa3b9285c08a33e5e08d2b295f19ca0c40c7db45fd49c00735e42b734e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, 0x0, 0x0, 0x0) epoll_create1(0x0) 23:53:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x3, 0x6, 0x0, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x34) [ 561.103302] audit: type=1400 audit(1575244414.590:329): avc: denied { prog_load } for pid=24325 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:53:34 executing program 2: clock_gettime(0x80000003, 0x0) 23:53:34 executing program 1: setgroups(0x2, &(0x7f0000000280)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000000700)=[0x0, 0x0]) [ 561.175679] audit: type=1400 audit(1575244414.660:330): avc: denied { prog_load } for pid=24325 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 561.406481] audit: type=1400 audit(1575244414.890:331): avc: denied { prog_load } for pid=24338 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 561.422114] audit: type=1400 audit(1575244414.900:332): avc: denied { prog_load } for pid=24338 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:53:36 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) creat(0x0, 0x0) io_submit(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000013c0)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 23:53:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xb3) read(r0, &(0x7f0000000040)=""/11, 0xfffffcfb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000140)) r3 = syz_open_pts(r0, 0x0) dup3(r2, r1, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) 23:53:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:53:36 executing program 2: clock_gettime(0x80000003, 0x0) 23:53:36 executing program 1: setgroups(0x2, &(0x7f0000000280)=[0x0, 0x0]) getgroups(0x2, &(0x7f0000000700)=[0x0, 0x0]) 23:53:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0xc}], 0xc}}], 0x1, 0x0) 23:53:36 executing program 2: clock_gettime(0x80000003, 0x0) 23:53:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000ae6fc7)="390000001300094701bb61e1c30500ff070000000400000045efffff08009b0019001a000f000000220001070000000004e9ff0006000d0005", 0x39}], 0x1000000000000040) 23:53:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x7f, 0x0, 0x1000200, 0x1, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, &(0x7f0000000340)=""/244}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x2, 0xa, 0xad, 0x0, 0x4, 0x0, 0x0, 0x25dfdbfc, [@sadb_x_sa2={0x2, 0x13, 0x1f}]}, 0x20}}, 0x4) 23:53:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0xc}], 0xc}}], 0x1, 0x0) 23:53:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000ae6fc7)="390000001300094701bb61e1c30500ff070000000400000045efffff08009b0019001a000f000000220001070000000004e9ff0006000d0005", 0x39}], 0x1000000000000040) 23:53:37 executing program 2: creat(&(0x7f0000000a40)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 23:53:38 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) creat(0x0, 0x0) io_submit(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000013c0)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) 23:53:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x7f, 0x0, 0x1000200, 0x1, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, &(0x7f0000000340)=""/244}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x2, 0xa, 0xad, 0x0, 0x4, 0x0, 0x0, 0x25dfdbfc, [@sadb_x_sa2={0x2, 0x13, 0x1f}]}, 0x20}}, 0x4) 23:53:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0xc}], 0xc}}], 0x1, 0x0) 23:53:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:53:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000ae6fc7)="390000001300094701bb61e1c30500ff070000000400000045efffff08009b0019001a000f000000220001070000000004e9ff0006000d0005", 0x39}], 0x1000000000000040) 23:53:38 executing program 2: creat(&(0x7f0000000a40)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 23:53:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(r0, &(0x7f0000005dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0xc}], 0xc}}], 0x1, 0x0) 23:53:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000ae6fc7)="390000001300094701bb61e1c30500ff070000000400000045efffff08009b0019001a000f000000220001070000000004e9ff0006000d0005", 0x39}], 0x1000000000000040) 23:53:38 executing program 2: creat(&(0x7f0000000a40)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 23:53:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x7f, 0x0, 0x1000200, 0x1, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, &(0x7f0000000340)=""/244}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x2, 0xa, 0xad, 0x0, 0x4, 0x0, 0x0, 0x25dfdbfc, [@sadb_x_sa2={0x2, 0x13, 0x1f}]}, 0x20}}, 0x4) 23:53:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x50}}, 0x0) 23:53:39 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208204) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x40000000000006, 0x3, 0x0, 0x1, [{}]}) 23:53:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0}}], 0x36, 0x0, 0x0) shutdown(r2, 0x0) 23:53:40 executing program 2: creat(&(0x7f0000000a40)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r1, 0x200006) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 23:53:40 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208204) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x40000000000006, 0x3, 0x0, 0x1, [{}]}) 23:53:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000440)={0x7f, 0x0, 0x1000200, 0x1, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, &(0x7f0000000340)=""/244}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x2, 0xa, 0xad, 0x0, 0x4, 0x0, 0x0, 0x25dfdbfc, [@sadb_x_sa2={0x2, 0x13, 0x1f}]}, 0x20}}, 0x4) 23:53:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x50}}, 0x0) 23:53:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) socket$inet6_udp(0xa, 0x2, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="00fd600080837637bf482804d50c7a33452c0b401f6923955d5f6f944fef537bff72176367c10073cf72d4335068ad4b0b8d4bc260c6c4a79b6636cd3831a119acc9b7ec"], 0x6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, 0x0, 0x60000000) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r3) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000100)) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0x7, 0x7}) 23:53:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x50}}, 0x0) 23:53:40 executing program 2: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:40 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208204) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x40000000000006, 0x3, 0x0, 0x1, [{}]}) 23:53:41 executing program 5: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40, 0xbbd}, 0x210, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000002700)=""/235, 0x417) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r1) ioctl$TCXONC(r3, 0x540a, 0x3) 23:53:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x50}}, 0x0) [ 567.812684] audit: type=1400 audit(1575244421.300:333): avc: denied { create } for pid=24460 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 567.930265] audit: type=1400 audit(1575244421.360:334): avc: denied { create } for pid=24454 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 23:53:41 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208204) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x180000f, 0x11, r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x40000000000006, 0x3, 0x0, 0x1, [{}]}) 23:53:41 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x39) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={@ipv4={[], [], @multicast2}, 0x0, r1}) [ 568.122942] audit: type=1400 audit(1575244421.610:335): avc: denied { create } for pid=24454 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 568.553005] audit: type=1400 audit(1575244422.040:336): avc: denied { create } for pid=24460 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:42 executing program 1: socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x180000) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x200, 0x3090, 0x800, 0x4, 0xf, 0x0, 0xff, 0x0, 0xaa}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_init() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x202040, 0x0) inotify_add_watch(r0, &(0x7f0000000240)='./file1\x00', 0x400) inotify_init() r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r1, &(0x7f00000003c0)='./file0\x00', 0x20000844) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x240000) r3 = inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) setgroups(0x0, 0x0) getegid() r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000844) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet(0x10, 0x2, 0x0) 23:53:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 23:53:42 executing program 2: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:42 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x39) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={@ipv4={[], [], @multicast2}, 0x0, r1}) 23:53:42 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 23:53:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@ipv6_newaddr={0x34, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x4c0}]}, 0x34}}, 0x0) [ 569.421054] audit: type=1400 audit(1575244422.880:337): avc: denied { create } for pid=24498 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 569.829272] audit: type=1400 audit(1575244423.210:338): avc: denied { create } for pid=24507 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:43 executing program 5: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40, 0xbbd}, 0x210, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000002700)=""/235, 0x417) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r1) ioctl$TCXONC(r3, 0x540a, 0x3) 23:53:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000300)={0x1, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000001c0)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 23:53:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x39) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={@ipv4={[], [], @multicast2}, 0x0, r1}) 23:53:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x39) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={@ipv4={[], [], @multicast2}, 0x0, r1}) 23:53:43 executing program 2: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@ipv6_newaddr={0x34, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x4c0}]}, 0x34}}, 0x0) 23:53:43 executing program 3: r0 = socket(0x18, 0x0, 0x3) connect(r0, 0x0, 0x0) 23:53:44 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:44 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="1020f5f20100070009000000030000000c0000000900000001000008020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:53:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@ipv6_newaddr={0x34, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x4c0}]}, 0x34}}, 0x0) [ 570.736819] audit: type=1400 audit(1575244424.220:339): avc: denied { create } for pid=24529 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:44 executing program 3: r0 = socket(0x18, 0x0, 0x3) connect(r0, 0x0, 0x0) [ 571.392707] audit: type=1400 audit(1575244424.850:340): avc: denied { create } for pid=24539 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@ipv6_newaddr={0x34, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_FLAGS={0x8, 0x8, 0x4c0}]}, 0x34}}, 0x0) [ 571.538311] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 571.538319] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 571.539168] F2FS-fs (loop4): Invalid segment/section count (22, 14 x 134217729) [ 571.539176] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 23:53:45 executing program 5: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40, 0xbbd}, 0x210, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000002700)=""/235, 0x417) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r1) ioctl$TCXONC(r3, 0x540a, 0x3) 23:53:45 executing program 2: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) 23:53:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="1020f5f20100070009000000030000000c0000000900000001000008020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:53:45 executing program 3: r0 = socket(0x18, 0x0, 0x3) connect(r0, 0x0, 0x0) 23:53:45 executing program 0: perf_event_open(&(0x7f0000001900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/ion\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x1000000d8) lseek(r0, 0x0, 0x4) [ 572.151833] audit: type=1400 audit(1575244425.640:341): avc: denied { create } for pid=24556 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x80045440, &(0x7f00003b9fdc)) 23:53:45 executing program 3: r0 = socket(0x18, 0x0, 0x3) connect(r0, 0x0, 0x0) [ 572.298302] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 23:53:45 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="1020f5f20100070009000000030000000c0000000900000001000008020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) [ 572.298309] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 572.298455] F2FS-fs (loop4): Invalid segment/section count (22, 14 x 134217729) [ 572.298461] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 23:53:46 executing program 1: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f0000000280), 0x8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) [ 572.879578] audit: type=1400 audit(1575244426.330:342): avc: denied { create } for pid=24572 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:53:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 23:53:46 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, 0x0) [ 573.197590] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 573.281695] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 573.352469] F2FS-fs (loop4): Invalid segment/section count (22, 14 x 134217729) [ 573.411371] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 23:53:47 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="1020f5f20100070009000000030000000c0000000900000001000008020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:53:47 executing program 5: mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40, 0xbbd}, 0x210, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000002700)=""/235, 0x417) r2 = syz_open_pts(r1, 0x0) r3 = dup2(r2, r1) ioctl$TCXONC(r3, 0x540a, 0x3) 23:53:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x14ec) chroot(&(0x7f00000002c0)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:53:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e5bea1d51daaacddc539010ffffff6530"], 0x14) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, '+'}, {0x20, '#'}], 0xa, "8890e9b0848ae8c41c8bd00317bd6044a9f1a37f7a5564669a1f145addc30f78789c27"}, 0x2c) 23:53:47 executing program 1: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f0000000280), 0x8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 23:53:47 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, 0x0) 23:53:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e5bea1d51daaacddc539010ffffff6530"], 0x14) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, '+'}, {0x20, '#'}], 0xa, "8890e9b0848ae8c41c8bd00317bd6044a9f1a37f7a5564669a1f145addc30f78789c27"}, 0x2c) [ 574.240783] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 574.273959] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock 23:53:47 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x14ec) chroot(&(0x7f00000002c0)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) [ 574.318730] F2FS-fs (loop4): Invalid segment/section count (22, 14 x 134217729) [ 574.385804] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 23:53:47 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, 0x0) 23:53:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e5bea1d51daaacddc539010ffffff6530"], 0x14) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, '+'}, {0x20, '#'}], 0xa, "8890e9b0848ae8c41c8bd00317bd6044a9f1a37f7a5564669a1f145addc30f78789c27"}, 0x2c) 23:53:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 23:53:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x14ec) chroot(&(0x7f00000002c0)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:53:48 executing program 1: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f0000000280), 0x8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 23:53:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, 0x0) 23:53:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e5bea1d51daaacddc539010ffffff6530"], 0x14) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', '.', [{0x20, '+'}, {0x20, '#'}], 0xa, "8890e9b0848ae8c41c8bd00317bd6044a9f1a37f7a5564669a1f145addc30f78789c27"}, 0x2c) 23:53:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 23:53:49 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x10400003) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x10400003) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x7, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='pstore\x00', 0x0, 0x0) 23:53:49 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x14ec) chroot(&(0x7f00000002c0)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r0, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 23:53:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x511, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvfrom$inet6(r0, 0x0, 0x0, 0x2020, 0x0, 0x0) 23:53:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)=0x244) 23:53:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 23:53:49 executing program 1: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{}, {0xffffffffffffffff, 0x2000}], 0x2, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f0000000280), 0x8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 23:53:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) shutdown(r0, 0x0) 23:53:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet(0x2, 0xa, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)) prctl$PR_SET_UNALIGN(0x6, 0x0) setgid(0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x2, 0x70bd29, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80c0}, 0x8084) 23:53:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)=0x244) [ 576.515082] serio: Serial port ptm0 23:53:50 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 23:53:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) shutdown(r0, 0x0) 23:53:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)=0x244) 23:53:50 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) [ 577.243144] serio: Serial port ptm1 23:53:50 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x3002}) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fstat(r1, 0x0) ftruncate(r2, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1, &(0x7f0000003680)=""/187, 0xbb}}], 0x2, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) setreuid(0x0, 0x0) socket$inet6(0xa, 0x6, 0x81) getresuid(&(0x7f0000004180), 0x0, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, 0x0, 0x0) close(r0) 23:53:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet(0x2, 0xa, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)) prctl$PR_SET_UNALIGN(0x6, 0x0) setgid(0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x2, 0x70bd29, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80c0}, 0x8084) 23:53:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) shutdown(r0, 0x0) 23:53:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)=0x244) 23:53:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) shutdown(r0, 0x0) [ 577.971418] serio: Serial port ptm0 23:53:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet(0x2, 0xa, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)) prctl$PR_SET_UNALIGN(0x6, 0x0) setgid(0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x2, 0x70bd29, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80c0}, 0x8084) 23:53:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:52 executing program 3: creat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x0, 0xfffffffffffffffd}, 0x20b) perf_event_open(&(0x7f00000001c0)={0x1, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) socketpair(0x1, 0x0, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r1, 0x6) 23:53:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:52 executing program 4: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000002c0)}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYBLOB="12ec93badbaa8968ff780b6b7ba0294ccf3e5f5e6576ec90b40d3b620913339c9203", @ANYRES16, @ANYPTR64, @ANYBLOB="a634d0bac85f138bb69c698e42421604d99e64cf2e11f795ad281645ae4d687a466c22f63039853a5f6ba10cdd7ec09211d8f67e3e6da2f79f6c833852d606f4270071f7b36ed268f2dc94a0798f84abe9c8c7336520420a108610d6a596a2a0e871f49a185a84f7e95bc3b1c50f6368c2e1ab0b08b40bfe"], 0x0, 0xb6}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 579.088612] serio: Serial port ptm0 23:53:53 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:53:53 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYBLOB="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"], 0x0, 0x143}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7277}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet(0x2, 0xa, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)) prctl$PR_SET_UNALIGN(0x6, 0x0) setgid(0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x2400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x2, 0x70bd29, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80c0}, 0x8084) 23:53:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) 23:53:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000480)=0x2) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) read(r0, 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 580.327157] serio: Serial port ptm0 23:53:54 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:53:54 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:54 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:54 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:54 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:55 executing program 4: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 23:53:56 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:53:56 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYBLOB="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"], 0x0, 0x143}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:53:56 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:56 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') 23:53:56 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:53:56 executing program 4: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 23:53:56 executing program 4: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 23:53:56 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000340)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='svaTm\x00') [ 583.513985] : renamed from ip_vti0 23:53:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r3, &(0x7f0000000540)=@objname={'system_u:object_r:bsdpty_device_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x0, 0x20, './file0\x00'}, 0x70) 23:53:57 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:53:57 executing program 4: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc0000000) 23:53:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x40000000) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x21) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) writev(r2, &(0x7f0000000240)=[{&(0x7f00000002c0)="2231c2e212ca0863329de44cf49dc8f3f5d1937787d1fff790ccd38c28074648cb38fad052ae8864adb34cf27501e1ade92b311a53dd78f3fc7b71c2d063705ae9935b67acfc463a", 0x48}], 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f00003ed000/0x3000)=nil, &(0x7f000011f000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000102000/0x4000)=nil, &(0x7f0000207000/0x1000)=nil, &(0x7f000011c000/0x1000)=nil, &(0x7f0000b05000/0x4000)=nil, &(0x7f0000710000/0x2000)=nil, &(0x7f0000a78000/0x4000)=nil, &(0x7f0000495000/0x3000)=nil, &(0x7f00004f1000/0x3000)=nil, &(0x7f0000000440)="cd6aa02f331e69d2e0117f09149297d69006ba065bf378688f279b6b02b8907fbe1e43e3ede33a0f9d79a9db1d6dddc2ab4e2b6e0eebf3a87f5d60da652a0b64c5d22043501b32b10ea004ca7b35f1a20310ffccf32ff7f8709ebfdbf15809d54daf83224b42732658801a8a7198aa3280f529dae4e1c2a9630c8d60bd6c47a08d2103b48b1311ac073034843d497243725bba047aa14d2e78c215cd635d03c42bd94ae8af732daa32d81d0b458393ba7041b6a629d3346798050419df498c2e604ef24563cfb63c73103eafcc0a132731377e401d5645aacdb5d0602463ce58f73920a70611f804c05078c8cdb5bd", 0xef, r2}, 0x68) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = gettid() ptrace(0x10, r4) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r6 = socket$inet(0x2, 0x3, 0x21) writev(r6, &(0x7f0000000240)=[{&(0x7f00000002c0)="2231c2e212ca0863329de44cf49dc8f3f5d1937787d1fff790ccd38c28074648cb38fad052ae8864adb34cf27501e1ade92b311a53dd78f3fc7b71c2d063705ae9935b67acfc463a", 0x48}], 0x1) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r8 = socket$inet(0x2, 0x3, 0x21) connect$inet(r8, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) writev(r8, &(0x7f0000000240)=[{&(0x7f00000002c0)="2231c2e212ca0863329de44cf49dc8f3f5d1937787d1fff790ccd38c28074648cb38fad052ae8864adb34cf27501e1ade92b311a53dd78f3fc7b71c2d063705ae9935b67acfc463a", 0x48}], 0x1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x64100010}, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000080)={0x18, 0x20, 0x4, 0x70bd27, 0x25dfdbfe, "", [@typed={0x8, 0x4c, @pid=r4}]}, 0x18}], 0x1, &(0x7f00000003c0)=[@rights={{0x34, 0x1, 0x1, [r5, r6, r7, r0, r8, r1, r0, r3, 0xffffffffffffffff]}}], 0x38, 0x10015}, 0x48000) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:53:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r3, &(0x7f0000000540)=@objname={'system_u:object_r:bsdpty_device_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x0, 0x20, './file0\x00'}, 0x70) 23:54:00 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYBLOB="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"], 0x0, 0x143}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7fff, &(0x7f0000000000)) 23:54:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r3, &(0x7f0000000540)=@objname={'system_u:object_r:bsdpty_device_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x0, 0x20, './file0\x00'}, 0x70) 23:54:00 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:54:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, 0xffc2}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd13c1c00]}, 0x48) 23:54:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r3, &(0x7f0000000540)=@objname={'system_u:object_r:bsdpty_device_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x0, 0x20, './file0\x00'}, 0x70) [ 586.715005] audit: type=1400 audit(1575244440.200:343): avc: denied { prog_load } for pid=24880 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:54:00 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7fff, &(0x7f0000000000)) [ 586.933222] audit: type=1400 audit(1575244440.420:344): avc: denied { prog_load } for pid=24880 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:54:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000100)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) 23:54:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:01 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7fff, &(0x7f0000000000)) 23:54:03 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYBLOB="17111261867261c573e07baccd84445c38350690d5d533e2923794cb588cb496f79cdd5ea1477f0f805ff8d25a34d6c9ec7b19d45daf44769e93465b9c968217bb4833a109410b31e93b4d821a036e69f01ab4958f87bb8251d3787e0340e61c85243fc3071f067fc63a48193011ed7bc569c876bcc3add90e94010cbb82d6a0e2437c506d170b39fc7124b6817cb24e2b64cc2e46de07ff29d965183e09240d128d062065a275bea935d76074c60887ade5acf06afab7c5d236d36535bfa3083bf9eb9fe4f7562e759618534db1f5ab433150e8f46c25244ace8fdfc6ff831d5b6e67576d6e67e4910ec59d21e0fb26ab6bfc1b72c3a7432b072e3e07e27e22bd9530ae5007368ae68b530dd1922ce90cc4b36011b0fe143ef3d250e63c84c045f97b6cb301a6f32be0d47388118b"], 0x0, 0x143}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:03 executing program 2: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 23:54:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:03 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x7fff, &(0x7f0000000000)) 23:54:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:03 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0xcea}]}) 23:54:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r2, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r5, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r6, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r7, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r8, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r9, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x16c) connect$inet(r10, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r11, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 23:54:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0xcea}]}) 23:54:04 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0xfffffffffffffef9, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)}], 0x3, 0x0, 0x253}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9c673b241fc9cf50f8174e33094b53d6766432245701230fc5", @ANYRES32], 0x0, 0x32}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0xcea}]}) 23:54:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 23:54:06 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x54, 0x0, &(0x7f00000001c0)=[@acquire={0x40046305, 0xffffffff}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@flat=@handle, @ptr={0x70742a85, 0x0, 0x0}, @flat=@handle}, &(0x7f0000000140)={0x0, 0x18, 0x40}}}], 0x0, 0x0, 0x0}) 23:54:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x101, 0x6d, 0x401, 0x0, 0x0}, 0x11) 23:54:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x1, &(0x7f00000001c0)=[{0x3, 0x0, 0x0, 0xcea}]}) 23:54:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 593.187989] audit: type=1400 audit(1575244446.670:345): avc: denied { map_create } for pid=24961 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:54:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:06 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket(0x1, 0x3, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c88682843e4f1cd80"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) tkill(r0, 0x3b) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) close(r1) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 593.297541] audit: type=1400 audit(1575244446.780:346): avc: denied { map_create } for pid=24961 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:54:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 23:54:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0) 23:54:07 executing program 2: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0xfffffffffffffffd) ftruncate(0xffffffffffffffff, 0x8) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) 23:54:07 executing program 1: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 23:54:07 executing program 1: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 23:54:07 executing program 1: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 23:54:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:08 executing program 1: r0 = socket(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 23:54:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:10 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket(0x1, 0x3, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c88682843e4f1cd80"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) tkill(r0, 0x3b) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) close(r1) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:10 executing program 1: ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x54, 0x0, &(0x7f00000001c0)=[@acquire, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@flat=@handle, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x0, 0x29}, @flat=@handle}, &(0x7f0000000140)={0x0, 0x18, 0x40}}}], 0x0, 0x0, 0x0}) 23:54:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:10 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket(0x1, 0x3, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c88682843e4f1cd80"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) tkill(r0, 0x3b) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) close(r1) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007e00), 0x152, 0x0) 23:54:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000100), 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000038) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 23:54:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) recvmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/121, 0x79}, {&(0x7f0000000240)=""/249, 0xf9}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000001440)=""/230, 0xe6}, {&(0x7f0000001540)=""/220, 0xdc}], 0x8, &(0x7f0000002740)=""/4096, 0x1000}, 0x6}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010041, &(0x7f00000062c0)={0x77359400}) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 23:54:13 executing program 1: unshare(0x40600) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r0, 0x0, 0x20) 23:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, {}, 0x20a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {}, 0xab852ebbeefbd631}) 23:54:13 executing program 1: unshare(0x40600) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r0, 0x0, 0x20) 23:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, {}, 0x20a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {}, 0xab852ebbeefbd631}) 23:54:14 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket(0x1, 0x3, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c88682843e4f1cd80"], 0x9}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) tkill(r0, 0x3b) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) close(r1) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r4}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:14 executing program 1: unshare(0x40600) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r0, 0x0, 0x20) 23:54:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) recvmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/121, 0x79}, {&(0x7f0000000240)=""/249, 0xf9}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000001440)=""/230, 0xe6}, {&(0x7f0000001540)=""/220, 0xdc}], 0x8, &(0x7f0000002740)=""/4096, 0x1000}, 0x6}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010041, &(0x7f00000062c0)={0x77359400}) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 23:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, {}, 0x20a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {}, 0xab852ebbeefbd631}) 23:54:14 executing program 1: unshare(0x40600) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) inotify_add_watch(r0, 0x0, 0x20) 23:54:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) 23:54:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) 23:54:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) recvmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/121, 0x79}, {&(0x7f0000000240)=""/249, 0xf9}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000001440)=""/230, 0xe6}, {&(0x7f0000001540)=""/220, 0xdc}], 0x8, &(0x7f0000002740)=""/4096, 0x1000}, 0x6}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010041, &(0x7f00000062c0)={0x77359400}) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 23:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @multicast1}, {}, 0x20a}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {}, 0xab852ebbeefbd631}) 23:54:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x14, 0x4000080000002, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) 23:54:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffec4, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500028cfc000543280000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000006000000000000eff24d0000cfa47e23f7efbffb", 0x4c}], 0x1}, 0x0) [ 603.317602] audit: type=1400 audit(1575244456.800:347): avc: denied { create } for pid=25115 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 23:54:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) recvmmsg(r0, &(0x7f0000006100)=[{{0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000140)=""/116, 0x74}, {&(0x7f00000001c0)=""/121, 0x79}, {&(0x7f0000000240)=""/249, 0xf9}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000340)=""/162, 0xa2}, {&(0x7f0000000400)=""/56, 0x38}, {&(0x7f0000001440)=""/230, 0xe6}, {&(0x7f0000001540)=""/220, 0xdc}], 0x8, &(0x7f0000002740)=""/4096, 0x1000}, 0x6}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010041, &(0x7f00000062c0)={0x77359400}) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) [ 603.385978] audit: type=1400 audit(1575244456.870:348): avc: denied { create } for pid=25115 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 [ 603.544941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 23:54:17 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcd", @ANYBLOB="8a7cfcb0bd543a072504167b455ddfd0640764ef04ff46cf47e8137f38a3729f9fbaa545c0c343d9b3bec2feff1f63caf2a574ca16195125fb104017c5b616d1bf75eab0661bd06a31db8bbe4406c651680ba38d2e34d596881a7fb3f462bf962a61abf049e6dd26234d1c87608fd903b178e0e1f335798fcf2f5da4362d762cba62ff7028c4c58be5910022915557e27db4a5cb9cf0040f94fe5b7590c7c9b7272fac2e08af15245b7b8cf34485cd19368d6991e3d177444c3bd5da3ac5f63b155fd0c852819c87dd0f78b620389231ac0010000000000000b2af165c124b6effb35a9b7a964a2c95afa0d8bdc1b3d463a1"], 0x0, 0x161}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@flush='flush'}]}) 23:54:17 executing program 5: setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6_vti0\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 23:54:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) 23:54:17 executing program 3: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0x10}) [ 603.912543] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 23:54:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffec4, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500028cfc000543280000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000006000000000000eff24d0000cfa47e23f7efbffb", 0x4c}], 0x1}, 0x0) 23:54:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000d06000), 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 23:54:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000040), 0x4) [ 604.404334] FAT-fs (loop4): bogus number of reserved sectors 23:54:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffec4, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500028cfc000543280000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000006000000000000eff24d0000cfa47e23f7efbffb", 0x4c}], 0x1}, 0x0) [ 604.427443] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 604.512970] FAT-fs (loop4): Can't find a valid FAT filesystem [ 604.625138] FAT-fs (loop4): bogus number of reserved sectors [ 604.655749] FAT-fs (loop4): Can't find a valid FAT filesystem 23:54:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@flush='flush'}]}) 23:54:18 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200055, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f030002000000"}, 0x99) 23:54:18 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000d06000), 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) [ 604.853721] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 605.135740] FAT-fs (loop4): bogus number of reserved sectors [ 605.151491] FAT-fs (loop4): Can't find a valid FAT filesystem 23:54:20 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040ecd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea94249", @ANYRESOCT=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f000000", @ANYRESOCT], 0x0, 0x14c}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffec4, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500028cfc000543280000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000006000000000000eff24d0000cfa47e23f7efbffb", 0x4c}], 0x1}, 0x0) 23:54:20 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x63, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 23:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@flush='flush'}]}) 23:54:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000d06000), 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 23:54:20 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @loopback, @remote}, 0xc) fdatasync(r2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000c00)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000b805000020010000000000002001000020010000f001000020050000200500002005000020050000200500000500000000000000000000007f000001e0000001000000ffffffffff76657468315f746f5f62726964676500626f6e645f736c6176655f300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e800200100000000000000000000000000000000000000000000000050006f736600000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000200000000000000000000000000000003800524544495245435400000000000000000000000000000000000000000000010000000a000000e0000001e00000010500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d0000000000000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000010000000ac1414aaac1414bb006601000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180250020000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000070000000100000001000000000000005001686173686c696d69740000000000000000000000000000000000000000026c6f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000ffff000000000000100000000008000006000000200000000000000000200000000000000000000038005245444952454354000000000000000000000000000000000000000000000100000004000000ac1e0101ac1414000065ff0f00"/1203], 0x1) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 23:54:20 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x63, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) [ 607.199933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 23:54:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="25bca274769e7c0aa734fa0095e0612687463915e38802a9d8aea872943afd874a2f98b479a7316270146d0e0af8e63ba889cad7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800000100000000}}]}) [ 607.381467] FAT-fs (loop4): bogus number of reserved sectors [ 607.397036] FAT-fs (loop4): Can't find a valid FAT filesystem 23:54:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005200)=[{{&(0x7f0000000000)={0xa, 0x4622, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@dstopts_2292={{0x14, 0x29, 0x4, {0x0, 0x2}}}, @dstopts_2292={{0x14}}], 0x28}}], 0x2, 0x0) 23:54:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000240)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@flush='flush'}]}) 23:54:21 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x63, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 23:54:21 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040ecd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea94249", @ANYRESOCT=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f000000", @ANYRESOCT], 0x0, 0x14c}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x315, 0x800000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000d06000), 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) 23:54:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005200)=[{{&(0x7f0000000000)={0xa, 0x4622, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@dstopts_2292={{0x14, 0x29, 0x4, {0x0, 0x2}}}, @dstopts_2292={{0x14}}], 0x28}}], 0x2, 0x0) 23:54:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="25bca274769e7c0aa734fa0095e0612687463915e38802a9d8aea872943afd874a2f98b479a7316270146d0e0af8e63ba889cad7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800000100000000}}]}) [ 608.021849] FAT-fs (loop4): bogus number of reserved sectors [ 608.030251] FAT-fs (loop4): Can't find a valid FAT filesystem 23:54:21 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x63, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x1e) 23:54:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005200)=[{{&(0x7f0000000000)={0xa, 0x4622, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@dstopts_2292={{0x14, 0x29, 0x4, {0x0, 0x2}}}, @dstopts_2292={{0x14}}], 0x28}}], 0x2, 0x0) 23:54:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2000001c}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2b) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:54:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000140)='\x00\x04\x00\x00', 0x0) write$binfmt_elf32(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000002ed8e4f9e765ce27b90300060000000000000000b738000000000035f4c38442a3bc82200005000000000203000000000000004000000000000000000000ffff080000000000090000000000000000000003000000000000000d60395a7088d7c27f000000a101000100030000000000a999caabac9d880348d1849ae697139777cc64e81a1ac4bc769e8c916c840d410c05e31dff0eca1ff9fc89d1ffd9f2174407619e3a318378887fa2920241332d623872339d63e84e2d5d14eefab45c2caab9c616bd06ab9cb5f0f55c57ea000000"], 0xd8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000080)={'team0\x00'}) 23:54:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="25bca274769e7c0aa734fa0095e0612687463915e38802a9d8aea872943afd874a2f98b479a7316270146d0e0af8e63ba889cad7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800000100000000}}]}) 23:54:22 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, @m_ife={0x18, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}}]}, 0x30}}, 0x0) 23:54:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2000001c}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2b) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:54:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005200)=[{{&(0x7f0000000000)={0xa, 0x4622, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000640)=[@dstopts_2292={{0x14, 0x29, 0x4, {0x0, 0x2}}}, @dstopts_2292={{0x14}}], 0x28}}], 0x2, 0x0) 23:54:24 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040ecd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea94249", @ANYRESOCT=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f000000", @ANYRESOCT], 0x0, 0x14c}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:24 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 23:54:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 23:54:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, @m_ife={0x18, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}}]}, 0x30}}, 0x0) 23:54:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="25bca274769e7c0aa734fa0095e0612687463915e38802a9d8aea872943afd874a2f98b479a7316270146d0e0af8e63ba889cad7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000200)={[{@min_batch_time={'min_batch_time', 0x3d, 0x800000100000000}}]}) 23:54:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2000001c}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2b) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:54:24 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 23:54:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x2000000000000074, 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2000001c}, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2b) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 23:54:24 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, @m_ife={0x18, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}}]}, 0x30}}, 0x0) 23:54:24 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x2, [{0x0, 0x2}]}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x2, 0x0) 23:54:24 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) [ 611.971596] input: syz1 as /devices/virtual/input/input19 [ 612.718397] input: syz1 as /devices/virtual/input/input20 [ 612.948275] input: syz1 as /devices/virtual/input/input21 [ 612.992223] input: syz1 as /devices/virtual/input/input22 23:54:27 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="040ecd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea94249", @ANYRESOCT=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f000000", @ANYRESOCT], 0x0, 0x14c}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:54:27 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e00)=@newtaction={0x30, 0x30, 0x1, 0x0, 0x0, {}, [{0x1c, 0x1, @m_ife={0x18, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x4}, {0x4}}}}]}, 0x30}}, 0x0) 23:54:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x2, [{0x0, 0x2}]}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x2, 0x0) 23:54:27 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0)=0x1f56, 0x9) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="00fd600080833bf03b476236327637bf482804d50c7a33452c0b401f6923955d5f6f944fef537bff72176367c10073cf72d4335068ad4b0b8d4bc260c6c4879b6636cd3831a119acc9b7ec3560765612c497a3c2994b1bb56066667c63bba44b9a5be3348b9e573d5b4a8d168f97ee126d5eb024c29256ee29cb86a3895c36dc1a37d5a87c4fda2a2104edac6f5e30ba2da455584ff94c2cd3bb7115911200393ce8766b152d93929d8ab919edf454b8d3748029940010000000000000"], 0xbd) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x4000) sendmsg$TIPC_NL_BEARER_GET(r3, 0x0, 0x60000000) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r4) ioctl$int_out(r2, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0x0, 0x7}) 23:54:27 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000ffc)=@fragment, 0x8) 23:54:27 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:28 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x2, [{0x0, 0x2}]}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x2, 0x0) 23:54:28 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:28 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0)=0x1f56, 0x9) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="00fd600080833bf03b476236327637bf482804d50c7a33452c0b401f6923955d5f6f944fef537bff72176367c10073cf72d4335068ad4b0b8d4bc260c6c4879b6636cd3831a119acc9b7ec3560765612c497a3c2994b1bb56066667c63bba44b9a5be3348b9e573d5b4a8d168f97ee126d5eb024c29256ee29cb86a3895c36dc1a37d5a87c4fda2a2104edac6f5e30ba2da455584ff94c2cd3bb7115911200393ce8766b152d93929d8ab919edf454b8d3748029940010000000000000"], 0xbd) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x4000) sendmsg$TIPC_NL_BEARER_GET(r3, 0x0, 0x60000000) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r4) ioctl$int_out(r2, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0x0, 0x7}) 23:54:28 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, 0x0}}, {{&(0x7f0000000840)={0x2, 0x4e22, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_retopts={{0x20, 0x0, 0x7, {[@cipso={0x86, 0x8, 0x2, [{0x0, 0x2}]}, @cipso={0x86, 0x6}]}}}], 0x20}}], 0x2, 0x0) 23:54:29 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 616.773702] input: syz1 as /devices/virtual/input/input23 [ 616.885265] input: syz1 as /devices/virtual/input/input24 23:54:31 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xe3a373e86a1674a6) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000003c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./bus\x00', 0x105) mmap(&(0x7f000038a000/0x4000)=nil, 0x4000, 0x0, 0x50, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) 23:54:31 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b05000000000000000147cd9c80159fc3e98cdf639aceeb433a99cf8c1f9a3545f518d09b62cc8551970cfd7c1375e0765440c4f417d1f2e9c2ecf5e6010722b7cdcf522b7785fd074425fb013716096a6a1a931e1ed9f36debe63b5d0e8236259df0331a997756a4b33f39c3d0ca3ff6a1efcec0dfaa5b685d972ef5997c4ceca6e85c1c0cbc94e742cd27734a28c188171f9cfb712db537ef3510afe764c85e0d276c0841ffce3251da246920319f31fe1895d9cf55fe8e4bb7c9924b1d8ed8eaf275722d37b8c3e6db115d820146be2a978c71a27f0ab987aff1ab4b8a30e1e2f26de9b6418b4be67b8d02818d0c7b5042423492d6d7f9fe24a66c3e057a29b41a33b5d2879cd77d898b7e4ff181e55b127ae425b0398561abc3374dbfec4a06a0463e8998a31e7d35de19e19668bc8c3f36e425dbde385ba5b5233e52af52534cd4433b4237cc035bbff14ecb1dafcb317ad61ff27371de9edc40e26b7940fae939bb02d77c", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:31 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:31 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000000)="09358e", 0x3, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) 23:54:31 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0)=0x1f56, 0x9) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="00fd600080833bf03b476236327637bf482804d50c7a33452c0b401f6923955d5f6f944fef537bff72176367c10073cf72d4335068ad4b0b8d4bc260c6c4879b6636cd3831a119acc9b7ec3560765612c497a3c2994b1bb56066667c63bba44b9a5be3348b9e573d5b4a8d168f97ee126d5eb024c29256ee29cb86a3895c36dc1a37d5a87c4fda2a2104edac6f5e30ba2da455584ff94c2cd3bb7115911200393ce8766b152d93929d8ab919edf454b8d3748029940010000000000000"], 0xbd) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x4000) sendmsg$TIPC_NL_BEARER_GET(r3, 0x0, 0x60000000) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r4) ioctl$int_out(r2, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0x0, 0x7}) 23:54:31 executing program 1: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:32 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0)=0x1f56, 0x9) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="00fd600080833bf03b476236327637bf482804d50c7a33452c0b401f6923955d5f6f944fef537bff72176367c10073cf72d4335068ad4b0b8d4bc260c6c4879b6636cd3831a119acc9b7ec3560765612c497a3c2994b1bb56066667c63bba44b9a5be3348b9e573d5b4a8d168f97ee126d5eb024c29256ee29cb86a3895c36dc1a37d5a87c4fda2a2104edac6f5e30ba2da455584ff94c2cd3bb7115911200393ce8766b152d93929d8ab919edf454b8d3748029940010000000000000"], 0xbd) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x4000) sendmsg$TIPC_NL_BEARER_GET(r3, 0x0, 0x60000000) keyctl$reject(0x13, 0x0, 0x0, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000840)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$revoke(0x3, r4) ioctl$int_out(r2, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000003c0)={0x0, 0x7}) 23:54:32 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000000)="09358e", 0x3, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) 23:54:32 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xe3a373e86a1674a6) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000003c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./bus\x00', 0x105) mmap(&(0x7f000038a000/0x4000)=nil, 0x4000, 0x0, 0x50, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) 23:54:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002540), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x50) utime(&(0x7f00000016c0)='./file0\x00', 0x0) 23:54:32 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000000)="09358e", 0x3, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) 23:54:33 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080480600000046000107070000141900040010ffffff9e0050680000000000edee38bf461e59d7", 0x39}], 0x1) [ 620.685460] input: syz1 as /devices/virtual/input/input25 [ 620.787554] input: syz1 as /devices/virtual/input/input26 23:54:34 executing program 3: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:34 executing program 5: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) getsockname(r0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='syzkaller1\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000580)="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", 0x187) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000040)=0x6629) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') r5 = socket$inet6(0xa, 0x1000000000002, 0x0) dup3(r5, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) readv(r6, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r6, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r7, 0x5501) readv(r7, &(0x7f00000004c0)=[{&(0x7f00000023c0)=""/4096, 0x18}], 0x3d3) write$uinput_user_dev(r7, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) sendfile(r6, r7, &(0x7f00000001c0)=0xc55, 0x6) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) 23:54:34 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r0, &(0x7f0000000000)="09358e", 0x3, 0x8002, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) 23:54:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080480600000046000107070000141900040010ffffff9e0050680000000000edee38bf461e59d7", 0x39}], 0x1) 23:54:34 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xe3a373e86a1674a6) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000003c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./bus\x00', 0x105) mmap(&(0x7f000038a000/0x4000)=nil, 0x4000, 0x0, 0x50, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) 23:54:34 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080480600000046000107070000141900040010ffffff9e0050680000000000edee38bf461e59d7", 0x39}], 0x1) 23:54:34 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="39000000130009006900000000000000ab0080480600000046000107070000141900040010ffffff9e0050680000000000edee38bf461e59d7", 0x39}], 0x1) 23:54:35 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:35 executing program 0: pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xe3a373e86a1674a6) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000003c0), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./bus\x00', 0x105) mmap(&(0x7f000038a000/0x4000)=nil, 0x4000, 0x0, 0x50, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002091, 0xffffffffffffffff, 0x0) [ 622.185608] input: syz1 as /devices/virtual/input/input27 23:54:35 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:36 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r0, r1, 0x0, 0x320f) 23:54:36 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:36 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:36 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 23:54:37 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:37 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 23:54:37 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:37 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:38 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0xf9) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r1, 0x0, 0x0) dup3(r0, r1, 0x180000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r2, &(0x7f00000003c0)='./file0\x00', 0x20000860) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r3, &(0x7f00000003c0)='./file0\x00', 0x20000844) dup2(r2, r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r4, &(0x7f00000003c0)='./file0\x00', 0x20000844) r5 = inotify_init() inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r6, &(0x7f00000003c0)='./file0\x00', 0x20000844) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r7, &(0x7f00000003c0)='./file0\x00', 0x0) r8 = inotify_init() inotify_add_watch(r8, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r8, &(0x7f00000003c0)='./file0\x00', 0x20000844) r9 = inotify_init() inotify_add_watch(r9, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r9, &(0x7f00000003c0)='./file0\x00', 0x20000844) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000600), 0x0, 0x400) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r10, &(0x7f00000003c0)='./file0\x00', 0x20000844) r11 = inotify_init() inotify_add_watch(r11, &(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r11, &(0x7f00000003c0)='./file0\x00', 0x20000844) r12 = inotify_init() inotify_add_watch(r12, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r12, 0x0, 0x20000844) r13 = inotify_init() inotify_add_watch(r13, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r13, &(0x7f00000003c0)='./file0\x00', 0x20000844) r14 = inotify_init() inotify_add_watch(r14, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r14, &(0x7f00000003c0)='./file0\x00', 0x20000844) r15 = inotify_init1(0x0) fcntl$setown(r15, 0x8, 0xffffffffffffffff) fcntl$getownex(r15, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace(0x4207, r16) ptrace$setsig(0x4203, r16, 0x0, &(0x7f00000000c0)) ptrace(0x4208, r16) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) r17 = getegid() setgroups(0x1, &(0x7f0000000200)=[r17]) getegid() inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r18 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r18, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r19 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') sendfile(r18, r19, 0x0, 0x8000) 23:54:38 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 23:54:38 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) 23:54:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_THP_DISABLE(0x29, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000001580)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x403, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x1, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="2d997e568b940344a40733b5e36b51d3"}}]}, 0x78}}, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)={0x2, 0xa, 0xad, 0x0, 0x6, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_sa={0x2, 0x1, 0x4d2, 0x0, 0x2, 0x83, 0x4, 0x80000000}, @sadb_x_sa2={0x2, 0x13, 0x1f, 0x0, 0x0, 0x70bd2a}]}, 0x30}}, 0x4) 23:54:39 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 23:54:39 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x1) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 23:54:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_tcp_int(r3, 0x6, 0x11, &(0x7f0000000000), 0x4) fcntl$setstatus(r2, 0x4, 0x80000000002c00) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 23:54:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x3ef}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r1, r2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r5 = socket$inet6(0xa, 0x0, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r4, r5, 0x0) r6 = dup2(r4, r0) r7 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r8 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r8, 0x29, 0x16, 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x300080, 0x0) r10 = socket(0xa, 0x801, 0x0) r11 = socket(0x0, 0x2, 0x0) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r12}) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f0000000140)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="92e3562bdf11ddc63f7b70aed00dd631", 0x2, 0x200, 0x7, 0xd00, 0xfffffffffffffbce, 0x8, r12}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000003100)={'ip6erspan0\x00', r12}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000003140)={{{@in=@empty, @in=@multicast1, 0x4e24, 0x291, 0x4e22, 0x7, 0x8, 0x20, 0x80, 0x3a, r13, r14}, {0x1, 0x5, 0x2, 0xfff, 0x0, 0x8, 0xd452, 0x4}, {0x6, 0x8, 0x4, 0x1}, 0x101, 0x6e6bb9, 0x0, 0x1, 0x1, 0x1}, {{@in=@empty, 0x4d3, 0x6c}, 0x2, @in=@multicast1, 0x0, 0x1, 0x2, 0x0, 0xfff, 0x8, 0xe5}}, 0xe8) r15 = syz_open_procfs(r3, &(0x7f0000000100)='net/snmp\x00') preadv(r15, &(0x7f0000000480), 0x10000000000002a1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x29) close(r2) r16 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x300080, 0x0) r17 = socket(0xa, 0x801, 0x0) r18 = socket(0x0, 0x2, 0x0) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r19}) sendmmsg(r16, &(0x7f0000000480)=[{{&(0x7f0000000140)=@hci={0x1f, r19}, 0x80, &(0x7f0000002600)=[{&(0x7f00000001c0)="c63bf2b303e19389795df2b5a168dae3a9d4cdaed3ada7e900f8e44d5deccabe5c274b70985dbd88b42a1b94629c4fad04ef4acbe4c7bec649fac63befa935c643415bd3313d40e4ed443461e6c39caf963ccef76c2b615fd6436c18f5bf50a52cb8eb7b3d6c87193621fdfdfd67469ac6c52ce4b10508990e034bda9f997338782f551f4d0d31cb427e209d60c3267d6e37a7b53fe2db30bb8c37301c7b58f242b513ef98bc3fa57731710a0e62e33419b0c28ffed411236757d72a1c", 0xbd}, {&(0x7f0000000540)="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", 0x700}, {&(0x7f0000000080)="100049132e5e2cb3f16d5cfd76119cf8e1f0c056f9109a500e1c9ccc9a48df703f34299f58d0d96134c347ac7eac25758d", 0x31}, {&(0x7f0000000280)="20daa11ee371646b8460f0b31bc0c9b2e69794806b42aa015301f265768f71f7714acd4b5e", 0x25}, {&(0x7f00000002c0)="26eb27135aada74a8900db643631ade455651fc6e758fb0e042a1a6e62acf4ac9963706847891ae616eea5e25154204adf31aca5679547121594a8335c4c505df049e46f7b90c5", 0x47}, {&(0x7f0000000340)="a32472cf6841fcb716475eb789dbfd616d323f4afa0b80471635b56b77659048fe3b56e7293d6c9471f15a68465c80d5554934816ddc4d9eadf24f13b228aca20de486979faf5ff67e91318e83d159cc0d656289953571617426221456b68d6b9646ded28f0edd04b79c868e9fe2e6b6608ce95f9a848dff196ab08915164dff362b14be80bd31007756f9c8c544da88902ef4b1ae6e16498fd08990814770624eaf8ac00c49aa96f17a89be1fd8b5eb7fd4ba98e8bffa01e712113142f7693c7277a1587ea493cf", 0xc8}, {&(0x7f0000000440)="a59d1c8b371f86915fb4d78b2f5e951bff9c", 0x12}, {&(0x7f0000002540)="9d871556ff831c294ba4c4d9388dcd8cda733b0921156a722472f5a67f631068fc23e108e00c539123674b517b5bd5251128a3ed139edea1e6055cf647e896578f41b01a7d9093ee6fc929a852d3beb5418a2c26991b0f623c73a97f62621bf6db605f0432f6e820f42ffb8ea7473645a8efda21b9a37a3ce92d64c9a9f974e8", 0x80}], 0x8, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x1ff}}], 0x1, 0xcc41ded0a5fe0154) 23:54:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=r2, @ANYBLOB="000000000000000010002b00040001007369740004000200"], 0x268}}, 0x0) 23:54:40 executing program 1: sigaltstack(&(0x7f0000ffb000/0x3000)=nil, 0x0) sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) capset(0x0, &(0x7f0000000480)={0x7, 0xda, 0x2, 0x3f, 0x8, 0x4}) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0), 0x19b3aef86ca2203c) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000f364e1747b4355b4600038100000215619545706000000000000000000000000b3b0adf90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a7cd8e55d893a85c8f61c64fe32de1bff6f5780931c4df8a3919adba121523451fdde9fa389a4155a2c2eaa5951ffda1a3271191f45a3d6ad01b91f8c488d9cfd17e7ff32c408b40edf6e23dd3e19c372884e1103c413feba015e6fcf0f21bd948eb5a047d1ddc9752950a21cadd"], 0xfdb4) 23:54:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=r2, @ANYBLOB="000000000000000010002b00040001007369740004000200"], 0x268}}, 0x0) 23:54:40 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 23:54:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:40 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x208200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) 23:54:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x3ef}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r1, r2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r5 = socket$inet6(0xa, 0x0, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r4, r5, 0x0) r6 = dup2(r4, r0) r7 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r8 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r8, 0x29, 0x16, 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x300080, 0x0) r10 = socket(0xa, 0x801, 0x0) r11 = socket(0x0, 0x2, 0x0) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r12}) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f0000000140)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="92e3562bdf11ddc63f7b70aed00dd631", 0x2, 0x200, 0x7, 0xd00, 0xfffffffffffffbce, 0x8, r12}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000003100)={'ip6erspan0\x00', r12}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000003140)={{{@in=@empty, @in=@multicast1, 0x4e24, 0x291, 0x4e22, 0x7, 0x8, 0x20, 0x80, 0x3a, r13, r14}, {0x1, 0x5, 0x2, 0xfff, 0x0, 0x8, 0xd452, 0x4}, {0x6, 0x8, 0x4, 0x1}, 0x101, 0x6e6bb9, 0x0, 0x1, 0x1, 0x1}, {{@in=@empty, 0x4d3, 0x6c}, 0x2, @in=@multicast1, 0x0, 0x1, 0x2, 0x0, 0xfff, 0x8, 0xe5}}, 0xe8) r15 = syz_open_procfs(r3, &(0x7f0000000100)='net/snmp\x00') preadv(r15, &(0x7f0000000480), 0x10000000000002a1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x29) close(r2) r16 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x300080, 0x0) r17 = socket(0xa, 0x801, 0x0) r18 = socket(0x0, 0x2, 0x0) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r19}) sendmmsg(r16, &(0x7f0000000480)=[{{&(0x7f0000000140)=@hci={0x1f, r19}, 0x80, &(0x7f0000002600)=[{&(0x7f00000001c0)="c63bf2b303e19389795df2b5a168dae3a9d4cdaed3ada7e900f8e44d5deccabe5c274b70985dbd88b42a1b94629c4fad04ef4acbe4c7bec649fac63befa935c643415bd3313d40e4ed443461e6c39caf963ccef76c2b615fd6436c18f5bf50a52cb8eb7b3d6c87193621fdfdfd67469ac6c52ce4b10508990e034bda9f997338782f551f4d0d31cb427e209d60c3267d6e37a7b53fe2db30bb8c37301c7b58f242b513ef98bc3fa57731710a0e62e33419b0c28ffed411236757d72a1c", 0xbd}, {&(0x7f0000000540)="57ea0362f5e7a8ac113c6db77347bce7d5d1e4907950a95ecd6964a989fd4a31f6267df96f84c94321c367a7cb8913270bc7ebc88b7a3a21a9968b088344cdef49ccfe98d2d86f602d76d97e55b91dafcc0f157022fd214a4101cfaac2e02508565392924b42e8448165b32b45f632ec71efea95713b9b188cd5521c16a69acd8d89fabeb125f9bac4cc69a40cb367334a869915f9b7b08c22bd833365026d6cc7818a3b68dc24d5f43d344f5d2b9935a0ba16831af80532505408bdeb008071becd9aa7831fce432e1df1e64bf5e770cf31dd3c185011829e89be1101415ee1ef8391dc8853bd47fd5bc093d7540b8ac80f91be2ddbe8e9898ba7ff7f06c0519c2b0cc73d9d18b9cdf1c6dfe00aa140bd31cd665393583c06c6f8da400763600b35b2c40aee513d60d4bd2a55077885938222bb6e95a90e22d5a88d660b61fb1f4f282577d69d580d22b482a1c6eb3c7b83babe30be08ba77be9a391e477d2a3e1b5227a930328d181e73c9fd7ad6b35d914953415838e3829deabc5a74e04cbc0f89a109021145a3493ef1991b15bdd02c3eb72bc6905134f89c094ad8702d6f3d3a9df68d4029ea1573259b3fe5174195305ee810c625ced88b913c27e9f55dec2baee0d780b95d6ce96a5a3aad846108997f6e41e5173ef559e09080bc2ab22a040f795834ffc6d3eaa5d49df1f51ebe7afd07e9b2938a6a74b55227fa3742b48bcf2ab4f51f0a8689a467c5a18716c810becd453626bd19cb657953421a7013501b74845f9abb2664589e6785d198b3eaf2a6e51e0dca9805d9a6aefabb3aa771ba77ad3a214094dfb7ef4a3f7aabe2de26fa88fa04b0e44cd1cf08bc42277fe6b0a5d86b19f6e5760e80da2e53fb22abcc78538ffff67dc8fcc647abccd9db8bb9d80b9b5aa6e944b5456e9cec13a8d7141b4324badc2e51c235660a5e89cfc4118f9b27bdc70d76f1c268873d3c85ad5c9a17d7822bb9bf3506c1473c6bd3287ba1d054478a8104d0886e135ae448819de97cef0c8eb088ff10f4083b0e5bc74aa468fbaae4a7996693f7b407b04b3ffec62ae557bd4a064fa7420ab977a8f9e3da2cbfa6d1bebad2e0eb5d9bf25837a6c72fe74574124474a5e8375f55b17093dd9c896544ae00175b60c4114b4e4f686c8607fe237938659afd48745429907345632c1c698a2bdc2db138c3cbcb659f966097c3ade7935ebdb09bdba6b8aa1cc31242c8f576c42cdb71497974f4e63944fe1571e0efc0b616e43a3a88aee6b5bac990efd4b3a71e043fcc3f4ffc97fa4e811abe2f4f76aac1a769bb3c3ccd4febb99c31dd90b1f38921a286e2448df5d098559e7c624695394092c6588ead578ccca4f0a19f83bdafdc74a5ceb4276ad3d9b3d6e5743e5f4568bbd0696ee98b9ffac29355cda1211a26b2d8674d12f31134b930a381b1e43e04242444ebe8358b0754d06d306fa28f8d594b4ea707e2f3a0518e7f5c4ff6f9c9e1bb871e06187e47e844b25d7d9eae536c9868ee30ded5c3b4c75a9e8e9098178a763c505dc8c1a085cdd10e1e0c038cf26632cf27975cf8f7b687dd3f7e0427e97a77579a8f548c80a14a368cfb245e37b2a4b6767761fa39ffe1c1dc3d801d8bba8dc5105abea398d09845485f1d9bb5d2ee73a08d9bd9d65a88d98c4dcdfffb07e7c0b70fa888a35a520f0666f50022149d1a62c8d7e6be4c162a6180fb4564c906c8f433cd3bb24b84f271c76f67948ee8045b25aa1bcc9b6d6a9b4a045ba94e81596eff756f335ac0292a84cde155ce78418305cfc4b59ec2a78fd78825843ba82c5ea28e38f2803d1973744cc54161a9f247824d638a7f8a2d657663d7c9c41e7722a8b348e8dc0f832cd7640d24c60409bbf0956e5477f43a5c8e93b68e7bf43039d446d16d996ff40422874d1e3bc17c4e23f3a7f84318d85dc54f0d45690f2cb301c41b9fc87541b0206a62c2dbd3affd62be3bd1f4b48faa32e35bbe8c6414495414ea5f7eade1d9379e452fd608dc2e7ce0c5a2bb49d1aae25c66100afc7ee6e6f1c7f540e4b4b5bafe05c2c6d34c604d6f3f4c5042e56dc31791dcc8cc483625db19aeb4c3db573cf145bfd8beec013831e2ad923b44a987abaaa21d3dcfba15ef3b0ba04e1588a089d19bf94b1853bc818f2d63aa37d4eb2b369d910a46906fbe6bf6932e739b18f82aac668036212e3be3d76ee384afacb4de8b9af05649d44ef2532c1e0dea1553d87d977946e1f682671ecd514ee2724020dd8d34ed945aeb5701aa44965c77b4458ff6c807234a080001111a20d84226ac716327a9b1da2b47776573877aed53a8599411170ea6a216a91e25c437a9e94b1d4afad9c77baaa7808351322d588550f4277b94f31f17c8b2b91c3c71714f29bb6c2665a5ef1d669373ca68ddae6e4fcc43da231643dee87e7c1e2433bae2e780391d6edcb4daefe19786cee192224e43817e43bf9820151990759f18d75a7dff4c9dce46c0dccab346d783a3c622617c9090dd5d55eec6969479db62559f84d882", 0x700}, {&(0x7f0000000080)="100049132e5e2cb3f16d5cfd76119cf8e1f0c056f9109a500e1c9ccc9a48df703f34299f58d0d96134c347ac7eac25758d", 0x31}, {&(0x7f0000000280)="20daa11ee371646b8460f0b31bc0c9b2e69794806b42aa015301f265768f71f7714acd4b5e", 0x25}, {&(0x7f00000002c0)="26eb27135aada74a8900db643631ade455651fc6e758fb0e042a1a6e62acf4ac9963706847891ae616eea5e25154204adf31aca5679547121594a8335c4c505df049e46f7b90c5", 0x47}, {&(0x7f0000000340)="a32472cf6841fcb716475eb789dbfd616d323f4afa0b80471635b56b77659048fe3b56e7293d6c9471f15a68465c80d5554934816ddc4d9eadf24f13b228aca20de486979faf5ff67e91318e83d159cc0d656289953571617426221456b68d6b9646ded28f0edd04b79c868e9fe2e6b6608ce95f9a848dff196ab08915164dff362b14be80bd31007756f9c8c544da88902ef4b1ae6e16498fd08990814770624eaf8ac00c49aa96f17a89be1fd8b5eb7fd4ba98e8bffa01e712113142f7693c7277a1587ea493cf", 0xc8}, {&(0x7f0000000440)="a59d1c8b371f86915fb4d78b2f5e951bff9c", 0x12}, {&(0x7f0000002540)="9d871556ff831c294ba4c4d9388dcd8cda733b0921156a722472f5a67f631068fc23e108e00c539123674b517b5bd5251128a3ed139edea1e6055cf647e896578f41b01a7d9093ee6fc929a852d3beb5418a2c26991b0f623c73a97f62621bf6db605f0432f6e820f42ffb8ea7473645a8efda21b9a37a3ce92d64c9a9f974e8", 0x80}], 0x8, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x1ff}}], 0x1, 0xcc41ded0a5fe0154) 23:54:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=r2, @ANYBLOB="000000000000000010002b00040001007369740004000200"], 0x268}}, 0x0) 23:54:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) lsetxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)={0x0, 0xfb, 0x79, 0x0, 0x0, "8da8da2e77ab9c998a8ef8b34244a45f", "8da97569b3b7b0ff6b12b22da66a21f98cd7a67a97ba909ebddac701a1fae10980b0a2882ae6fd518d293dc36cbfe1a78dafb2e7e5942e77efb67596d284102f31603f310184cd8ee4e5bd185c6e60f53df295fb7f045690d7a2837db198298913923662"}, 0x79, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setreuid(0x0, 0x0) pipe(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xefc, 0xf7, &(0x7f00000005c0)="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", &(0x7f00000015c0)=""/247, 0x5, 0x0, 0x8f, 0xde, &(0x7f0000000200)="74a3a9764a05b5d7307008d1492c7548286f8b6a7301e11c6eec84ae226189bf0478a88af8621504932cf9fca69c6aa07bb5eb67be2cad37d9fa991c6e4dd56da0447c5d01186d28dce1875c009befae2e9b884d59a17d7c49a9c9cee1bf623e2fd45c8ae7c520f688783f08e00a871bb0f4e53aa321403f5a4f7c79b96ff22ca47fa83b3f43ddba51fde379c5a5d1", &(0x7f00000016c0)="571d6a515b9334980b061fa3cdf51ac8ba131e7a1eb845069dc63c09ea75674298cf86ce03d01324236d01cfa097c70446ad73952af6f4fdf9ce4fcc1000b4cba4c5fa4c69b04a67e81263601afd0686b08cfdfd8efb646ab84223c3d85f207d7751c38e14f68c566a911f6905304a5c305a3edf5cbbef0ef09ae0d66c5c8eb47b6132be2e62db803ba43853829ed95ab18832a3c535e75a94466f3ed241ca75727313b31ad78b5b52767a5f27b8f10c65637029414786c3984e53ccae34a639847fa91565f9172457f0aa8721f69a0d70c100cfc96857dad51719cecec0"}, 0x40) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @empty}}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) setreuid(0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 23:54:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'sit0\x00\x00\x01\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=r2, @ANYBLOB="000000000000000010002b00040001007369740004000200"], 0x268}}, 0x0) 23:54:42 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 23:54:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x4, 0x4) timerfd_gettime(r2, &(0x7f0000000040)) ftruncate(r2, 0x7e) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r3, r3, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r4, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 23:54:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x3ef}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r1, r2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r5 = socket$inet6(0xa, 0x0, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r4, r5, 0x0) r6 = dup2(r4, r0) r7 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r8 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r8, 0x29, 0x16, 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x300080, 0x0) r10 = socket(0xa, 0x801, 0x0) r11 = socket(0x0, 0x2, 0x0) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r12}) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f0000000140)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="92e3562bdf11ddc63f7b70aed00dd631", 0x2, 0x200, 0x7, 0xd00, 0xfffffffffffffbce, 0x8, r12}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000003100)={'ip6erspan0\x00', r12}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000003140)={{{@in=@empty, @in=@multicast1, 0x4e24, 0x291, 0x4e22, 0x7, 0x8, 0x20, 0x80, 0x3a, r13, r14}, {0x1, 0x5, 0x2, 0xfff, 0x0, 0x8, 0xd452, 0x4}, {0x6, 0x8, 0x4, 0x1}, 0x101, 0x6e6bb9, 0x0, 0x1, 0x1, 0x1}, {{@in=@empty, 0x4d3, 0x6c}, 0x2, @in=@multicast1, 0x0, 0x1, 0x2, 0x0, 0xfff, 0x8, 0xe5}}, 0xe8) r15 = syz_open_procfs(r3, &(0x7f0000000100)='net/snmp\x00') preadv(r15, &(0x7f0000000480), 0x10000000000002a1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x29) close(r2) r16 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x300080, 0x0) r17 = socket(0xa, 0x801, 0x0) r18 = socket(0x0, 0x2, 0x0) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r19}) sendmmsg(r16, &(0x7f0000000480)=[{{&(0x7f0000000140)=@hci={0x1f, r19}, 0x80, &(0x7f0000002600)=[{&(0x7f00000001c0)="c63bf2b303e19389795df2b5a168dae3a9d4cdaed3ada7e900f8e44d5deccabe5c274b70985dbd88b42a1b94629c4fad04ef4acbe4c7bec649fac63befa935c643415bd3313d40e4ed443461e6c39caf963ccef76c2b615fd6436c18f5bf50a52cb8eb7b3d6c87193621fdfdfd67469ac6c52ce4b10508990e034bda9f997338782f551f4d0d31cb427e209d60c3267d6e37a7b53fe2db30bb8c37301c7b58f242b513ef98bc3fa57731710a0e62e33419b0c28ffed411236757d72a1c", 0xbd}, {&(0x7f0000000540)="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", 0x700}, {&(0x7f0000000080)="100049132e5e2cb3f16d5cfd76119cf8e1f0c056f9109a500e1c9ccc9a48df703f34299f58d0d96134c347ac7eac25758d", 0x31}, {&(0x7f0000000280)="20daa11ee371646b8460f0b31bc0c9b2e69794806b42aa015301f265768f71f7714acd4b5e", 0x25}, {&(0x7f00000002c0)="26eb27135aada74a8900db643631ade455651fc6e758fb0e042a1a6e62acf4ac9963706847891ae616eea5e25154204adf31aca5679547121594a8335c4c505df049e46f7b90c5", 0x47}, {&(0x7f0000000340)="a32472cf6841fcb716475eb789dbfd616d323f4afa0b80471635b56b77659048fe3b56e7293d6c9471f15a68465c80d5554934816ddc4d9eadf24f13b228aca20de486979faf5ff67e91318e83d159cc0d656289953571617426221456b68d6b9646ded28f0edd04b79c868e9fe2e6b6608ce95f9a848dff196ab08915164dff362b14be80bd31007756f9c8c544da88902ef4b1ae6e16498fd08990814770624eaf8ac00c49aa96f17a89be1fd8b5eb7fd4ba98e8bffa01e712113142f7693c7277a1587ea493cf", 0xc8}, {&(0x7f0000000440)="a59d1c8b371f86915fb4d78b2f5e951bff9c", 0x12}, {&(0x7f0000002540)="9d871556ff831c294ba4c4d9388dcd8cda733b0921156a722472f5a67f631068fc23e108e00c539123674b517b5bd5251128a3ed139edea1e6055cf647e896578f41b01a7d9093ee6fc929a852d3beb5418a2c26991b0f623c73a97f62621bf6db605f0432f6e820f42ffb8ea7473645a8efda21b9a37a3ce92d64c9a9f974e8", 0x80}], 0x8, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x1ff}}], 0x1, 0xcc41ded0a5fe0154) 23:54:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x3ef}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r1, r2, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) r4 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r4, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r5 = socket$inet6(0xa, 0x0, 0xff) setsockopt$inet6_int(r5, 0x29, 0x16, &(0x7f0000fcb000), 0x4) dup3(r4, r5, 0x0) r6 = dup2(r4, r0) r7 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r7, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r8 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r8, 0x29, 0x16, 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat(0xffffffffffffffff, 0x0, 0x300080, 0x0) r10 = socket(0xa, 0x801, 0x0) r11 = socket(0x0, 0x2, 0x0) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r12}) ioctl$sock_inet6_SIOCDELRT(r9, 0x890c, &(0x7f0000000140)={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="92e3562bdf11ddc63f7b70aed00dd631", 0x2, 0x200, 0x7, 0xd00, 0xfffffffffffffbce, 0x8, r12}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000003100)={'ip6erspan0\x00', r12}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000003140)={{{@in=@empty, @in=@multicast1, 0x4e24, 0x291, 0x4e22, 0x7, 0x8, 0x20, 0x80, 0x3a, r13, r14}, {0x1, 0x5, 0x2, 0xfff, 0x0, 0x8, 0xd452, 0x4}, {0x6, 0x8, 0x4, 0x1}, 0x101, 0x6e6bb9, 0x0, 0x1, 0x1, 0x1}, {{@in=@empty, 0x4d3, 0x6c}, 0x2, @in=@multicast1, 0x0, 0x1, 0x2, 0x0, 0xfff, 0x8, 0xe5}}, 0xe8) r15 = syz_open_procfs(r3, &(0x7f0000000100)='net/snmp\x00') preadv(r15, &(0x7f0000000480), 0x10000000000002a1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x29) close(r2) r16 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x300080, 0x0) r17 = socket(0xa, 0x801, 0x0) r18 = socket(0x0, 0x2, 0x0) getsockname$packet(r18, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r17, 0x890b, &(0x7f0000000180)={@rand_addr="010000c437cd7b06174438b01832ee9f", @empty, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820400ff, r19}) sendmmsg(r16, &(0x7f0000000480)=[{{&(0x7f0000000140)=@hci={0x1f, r19}, 0x80, &(0x7f0000002600)=[{&(0x7f00000001c0)="c63bf2b303e19389795df2b5a168dae3a9d4cdaed3ada7e900f8e44d5deccabe5c274b70985dbd88b42a1b94629c4fad04ef4acbe4c7bec649fac63befa935c643415bd3313d40e4ed443461e6c39caf963ccef76c2b615fd6436c18f5bf50a52cb8eb7b3d6c87193621fdfdfd67469ac6c52ce4b10508990e034bda9f997338782f551f4d0d31cb427e209d60c3267d6e37a7b53fe2db30bb8c37301c7b58f242b513ef98bc3fa57731710a0e62e33419b0c28ffed411236757d72a1c", 0xbd}, {&(0x7f0000000540)="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", 0x700}, {&(0x7f0000000080)="100049132e5e2cb3f16d5cfd76119cf8e1f0c056f9109a500e1c9ccc9a48df703f34299f58d0d96134c347ac7eac25758d", 0x31}, {&(0x7f0000000280)="20daa11ee371646b8460f0b31bc0c9b2e69794806b42aa015301f265768f71f7714acd4b5e", 0x25}, {&(0x7f00000002c0)="26eb27135aada74a8900db643631ade455651fc6e758fb0e042a1a6e62acf4ac9963706847891ae616eea5e25154204adf31aca5679547121594a8335c4c505df049e46f7b90c5", 0x47}, {&(0x7f0000000340)="a32472cf6841fcb716475eb789dbfd616d323f4afa0b80471635b56b77659048fe3b56e7293d6c9471f15a68465c80d5554934816ddc4d9eadf24f13b228aca20de486979faf5ff67e91318e83d159cc0d656289953571617426221456b68d6b9646ded28f0edd04b79c868e9fe2e6b6608ce95f9a848dff196ab08915164dff362b14be80bd31007756f9c8c544da88902ef4b1ae6e16498fd08990814770624eaf8ac00c49aa96f17a89be1fd8b5eb7fd4ba98e8bffa01e712113142f7693c7277a1587ea493cf", 0xc8}, {&(0x7f0000000440)="a59d1c8b371f86915fb4d78b2f5e951bff9c", 0x12}, {&(0x7f0000002540)="9d871556ff831c294ba4c4d9388dcd8cda733b0921156a722472f5a67f631068fc23e108e00c539123674b517b5bd5251128a3ed139edea1e6055cf647e896578f41b01a7d9093ee6fc929a852d3beb5418a2c26991b0f623c73a97f62621bf6db605f0432f6e820f42ffb8ea7473645a8efda21b9a37a3ce92d64c9a9f974e8", 0x80}], 0x8, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], 0x1ff}}], 0x1, 0xcc41ded0a5fe0154) 23:54:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:43 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x101142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = memfd_create(&(0x7f0000001540)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xbd\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r3, r4, 0x0, 0x40d5) 23:54:43 executing program 4: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:44 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 23:54:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:45 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x101142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = memfd_create(&(0x7f0000001540)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xbd\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r3, r4, 0x0, 0x40d5) 23:54:45 executing program 4: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000240)=0xd, 0x4) getsockopt$inet6_int(r0, 0x29, 0x48, 0x0, &(0x7f00007d0000)) 23:54:45 executing program 0: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 23:54:46 executing program 3: getdents(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:54:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:46 executing program 0: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:46 executing program 3: getdents(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:54:46 executing program 4: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:46 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x101142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = memfd_create(&(0x7f0000001540)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xbd\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r3, r4, 0x0, 0x40d5) 23:54:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x27e) 23:54:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 23:54:47 executing program 3: getdents(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:54:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:54:47 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x101142, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = memfd_create(&(0x7f0000001540)='}\xbf*x\x89-vO\xd3JUk\x88O\xc4N\xa2\rqI\r\xb3\xd9Q(\n\x1a\x9f/X\x1d9\x03\xc2\x16\xaf\x9d\xffl\xdcC\xeb\xa6\x96\x12$\xd15[z\x85\xf4\x1e\xcc\xfc\xf64\x00\x00\x00\x00\x00\x00\x00Pw\x1bN[\x81\x92\x15P\xc5\x0e\x06\x17\b\xaf\nu\xd8D9z\x9eR\bjh\xce\xa9j\xda\xf8B\x84\x8d\x12.\xeb\x95\x9a\n\xb2M\xc7\xd1\x87N\xc5Os?T\"\xfc\fc\x92\xbb>\xa3l\x9a\xc9\'\x14\xd5+\xb1\xa6\xf5\x9e\xd1\xea%\xd8l\xae\xd6\\dZ\x17/\xe7$(\x8ax\xdc\xc4\xb7\xa4\x9b\x92\xd8\x16Lz\x9e\xfc\xf8\xf1\xdc\xb9+F~%\x16e\x81\x1b\x11vw1:\xdd]\xb9\xe8\x99\xea\xd1O\x83\xf3WA\xad\xaa\xdc\r~[I\x9f\xac\x03\xf9\xe2\x12Je\xe9$\xd2\x00\xef\r\x9dQ2\xa1T4\xb4\x116RO+\x0e\x98\x8b\x1b\xc1\x81\xf0U\x93\xd1\xf7\xbb}N\'\xea\x8f\xbbdd\xda\xb5\x7f\xff\xef\xfd\xd5\x9b\x01?\xad \xa8\xe3l\x86\"\x94M\xd5\xfa]\x9f\x1d\xad\xf9y\xfc\x03=$Z\x00Oa#`qHd\xcc\x8f\x80\xa1\xed\x81 \x85\xe7\x1f\x99\xbe\xe8\xe5\xcey\n\xab\x8b\xa0yM\xba\xcf7}\x8eVQ\xe6d.S\x9e\xb1\x98\xd9\xc8;\xcc\xd5\xf2)\xf7Zh)\xffF\xb8\xc7\xd2%\xe9\xc7\x05\xefq\\\x97]\xd7\x1b\xdf\"o\xca\xd4\xe0\xd5\x125\xefz1\xcc\xe1nZ\xbe\x16\xa1\x8f\xc8)9\xb8\xc6\xc2\xdd8.*U\xe0\xc5\x04\x00\xd9\xfd{ZT\xf2\xe4\xb9\x95x\xa5\xbd\x04\x0f\x8eky\xd8\x8e\xd77\xd7\x0fp\n\x11\x13)\x9b\xf3D\xb2\x88*(\x02{\xb2`:\x01\x00\x00\x00\x00\x00\x00\xee\xff\xff\xffV2\xaa\x82', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') sendfile(r3, r4, 0x0, 0x40d5) 23:54:47 executing program 3: getdents(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:54:47 executing program 0: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:48 executing program 4: futex(0x0, 0x88, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) exit(0x0) 23:54:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) shutdown(r0, 0x0) 23:54:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 23:54:49 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r3, r4, 0x0, 0xedc0) socket$packet(0x11, 0x3, 0x300) 23:54:49 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@getae={0x40, 0x1f, 0x3197bf6d581f8fb, 0x0, 0x0, {{@in=@multicast2}}}, 0x40}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 23:54:49 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84302910000003900090035000c00060000001900150006000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 23:54:49 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 23:54:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) [ 636.324620] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=25783 comm=syz-executor.3 23:54:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:54:50 executing program 1: pipe(0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x80000, 0xf) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) socket(0x0, 0x0, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, &(0x7f0000000500), &(0x7f0000000580)=0x0) setresuid(0x0, 0x0, 0x0) getresgid(&(0x7f0000000480), &(0x7f0000000500), &(0x7f0000000580)) setresgid(0x0, r3, 0x0) pidfd_open(0x0, 0x0) getdents64(r1, &(0x7f0000002340)=""/4082, 0xff2) 23:54:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:54:50 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create1(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)) r4 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) getitimer(0x0, &(0x7f0000000400)) fremovexattr(0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:54:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000530ff8)=0x4) shutdown(r0, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000093a000), 0x4) 23:54:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:54:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000530ff8)=0x4) shutdown(r0, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000093a000), 0x4) 23:54:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 23:54:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x54, 0x0, &(0x7f00000001c0)=[@acquire, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000140)}}], 0x0, 0x0, 0x0}) 23:54:51 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:54:51 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create1(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)) r4 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) getitimer(0x0, &(0x7f0000000400)) fremovexattr(0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:54:51 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0xe5b}}) 23:54:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:54:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000530ff8)=0x4) shutdown(r0, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000093a000), 0x4) 23:54:52 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r7, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYBLOB, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e", @ANYRES32, @ANYBLOB="38000100240001006c620706006174735f756566726573685f696eef390974d13a9e4b00000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0007fe4e036a439097610c8e764eef9a890000000000008ba28286a977f721", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1a}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x30}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r13, 0x0, 0x1) lseek(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r14 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r15}]]}}}]}, 0x38}}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 23:54:52 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 23:54:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\v', 0x1, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r4, r6, 0x0) 23:54:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000530ff8)=0x4) shutdown(r0, 0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f000093a000), 0x4) [ 639.074377] audit: type=1400 audit(1575244492.560:349): avc: denied { create } for pid=25853 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:52 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800000bf) 23:54:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') syz_open_dev$sndtimer(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) 23:54:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\v', 0x1, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r4, r6, 0x0) 23:54:53 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create1(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)) r4 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) getitimer(0x0, &(0x7f0000000400)) fremovexattr(0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 639.697130] audit: type=1400 audit(1575244493.180:350): avc: denied { create } for pid=25853 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:53 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r7, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYBLOB, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e", @ANYRES32, @ANYBLOB="38000100240001006c620706006174735f756566726573685f696eef390974d13a9e4b00000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0007fe4e036a439097610c8e764eef9a890000000000008ba28286a977f721", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1a}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x30}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r13, 0x0, 0x1) lseek(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r14 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r15}]]}}}]}, 0x38}}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 23:54:53 executing program 3: sched_setaffinity(0x0, 0x2de, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x0) recvmmsg(r0, &(0x7f0000009400)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f00000013c0)=""/166, 0xa6}], 0x1, &(0x7f00000014c0)=""/129, 0x81}, 0x4}, {{&(0x7f0000001580)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001600)=""/190, 0xbe}, {&(0x7f00000016c0)=""/117, 0x75}, {&(0x7f0000001740)=""/1, 0x1}, {&(0x7f0000002800)=""/138, 0x8a}, {&(0x7f00000028c0)=""/4096, 0x1000}], 0x5, &(0x7f00000038c0)=""/66, 0x42}, 0x2}, {{&(0x7f0000003940)=@sco, 0x80, &(0x7f0000003a40)=[{&(0x7f00000039c0)=""/83, 0x53}], 0x1, &(0x7f0000003a80)=""/101, 0x65}, 0x3e}, {{&(0x7f0000003b00)=@isdn, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b80)=""/87, 0x57}], 0x1, &(0x7f0000003c40)=""/254, 0xfe}, 0x4}, {{&(0x7f0000003d40)=@ipx, 0x80, &(0x7f00000050c0)=[{&(0x7f0000003dc0)=""/1, 0x1}, {&(0x7f0000003e00)=""/33, 0x21}, {&(0x7f0000003e40)=""/180, 0xb4}, {&(0x7f0000003f00)=""/156, 0x9c}, {&(0x7f0000003fc0)=""/220, 0xdc}, {&(0x7f00000040c0)=""/4096, 0x1000}], 0x6}, 0x8000}, {{&(0x7f0000005140)=@nfc_llcp, 0x80, &(0x7f00000054c0)=[{&(0x7f00000051c0)=""/182, 0xb6}, {&(0x7f0000005280)=""/231, 0xe7}, {&(0x7f0000005480)=""/7, 0x7}], 0x3, &(0x7f0000005500)=""/249, 0xf9}, 0x4}, {{&(0x7f0000005600), 0x80, &(0x7f00000059c0)=[{0x0}, {&(0x7f00000057c0)=""/186, 0xba}, {0x0}, {0x0}], 0x4, &(0x7f0000005a40)=""/110, 0x6e}, 0xff}], 0x7, 0x100, &(0x7f0000009640)={0x77359400}) sendto$packet(r1, &(0x7f00000003c0)="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", 0xc00, 0x40, &(0x7f0000009680)={0x11, 0x0, r2, 0x1, 0x1}, 0x14) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x1, 0x7, 0x3, 0x0, 0x80000000, 0x0, 0xd92fa9335c17d335, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000140), 0x4c36a9ddfd4e3a55}, 0x10200, 0x8, 0x1f, 0xd, 0x2, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) preadv(0xffffffffffffffff, 0x0, 0x0, 0x4) write$binfmt_elf64(r3, &(0x7f0000001640)=ANY=[], 0xf5aab446) 23:54:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x80000006}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:54:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\v', 0x1, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r4, r6, 0x0) 23:54:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x2000200, 0x7, 0x0, 0x0}, 0x1a) [ 640.808973] audit: type=1400 audit(1575244494.290:351): avc: denied { create } for pid=25885 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:54:54 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) 23:54:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\v', 0x1, 0xffffffffffffffff) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) keyctl$chown(0x4, r4, r6, 0x0) [ 640.892240] audit: type=1400 audit(1575244494.380:352): avc: denied { map_create } for pid=25894 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 640.893864] audit: type=1400 audit(1575244494.380:353): avc: denied { map_create } for pid=25894 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:54:54 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create1(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x0, 0x0, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)) r4 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) getitimer(0x0, &(0x7f0000000400)) fremovexattr(0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:54:54 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r7, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYBLOB, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e", @ANYRES32, @ANYBLOB="38000100240001006c620706006174735f756566726573685f696eef390974d13a9e4b00000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0007fe4e036a439097610c8e764eef9a890000000000008ba28286a977f721", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1a}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x30}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r13, 0x0, 0x1) lseek(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r14 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r15}]]}}}]}, 0x38}}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 23:54:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0x10}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 641.902494] audit: type=1400 audit(1575244495.350:354): avc: denied { create } for pid=25901 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 642.230065] audit: type=1400 audit(1575244495.710:356): avc: denied { create } for pid=25901 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 642.277673] audit: type=1400 audit(1575244495.710:355): avc: denied { create } for pid=25903 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:55 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) 23:54:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0x10}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 642.653891] audit: type=1400 audit(1575244496.140:357): avc: denied { create } for pid=25915 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:56 executing program 2: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="00fd600080833bf03b476236327637bf482804d50c7a33452c0b401f6923955d5f6f94a1f6e8fac3cfcf4e8c5d9c3298f1c9c469498eec3e42ec21c24237e18acf6ed70f7fda281f5438c40646c7a73c37671cbc90db1ffef44d6e998b1c78a93aa4b575c671c05f17e6695b830adcaa1e27e694aca34c84e387bad353a876363479a8c0320b0f1e71c45309e7628862f62318e86d77fbc7dc2818aef44e00000000000000003217f004a68d5aca25a9d705e75a3af4a1bb0c5fac49a9cc1c78fd0af73e35de3edf7fb6c913835fadab87c64b5b6809543dadbe27731aec7e0000000000826f17144ab6a3bc4e7161c53167cd471de395fba5e9fbdc9a7974e58ee554a4e1d26c"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) 23:54:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:54:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) [ 642.681724] audit: type=1400 audit(1575244496.170:358): avc: denied { create } for pid=25903 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:56 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f00000035c0)}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xa198) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00'}) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r7, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r5, @ANYRES16=r4, @ANYBLOB, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e", @ANYRES32, @ANYBLOB="38000100240001006c620706006174735f756566726573685f696eef390974d13a9e4b00000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0007fe4e036a439097610c8e764eef9a890000000000008ba28286a977f721", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1a}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4, 0x2, [@tunl_policy]}}}]}, 0x30}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@empty, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@empty, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0x2d) r13 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') lseek(r13, 0x0, 0x1) lseek(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r14 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r15}]]}}}]}, 0x38}}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 23:54:57 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) 23:54:57 executing program 2: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) [ 644.123391] audit_printk_skb: 9 callbacks suppressed [ 644.123404] audit: type=1400 audit(1575244497.610:362): avc: denied { create } for pid=25945 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) [ 644.372720] audit: type=1400 audit(1575244497.860:363): avc: denied { create } for pid=25955 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) [ 644.957740] audit: type=1400 audit(1575244498.440:364): avc: denied { create } for pid=25962 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 645.219927] audit: type=1400 audit(1575244498.700:365): avc: denied { create } for pid=25966 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:58 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) 23:54:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:54:59 executing program 2: openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/50) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x8000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x107) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x60000000) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'\xa9\x00'}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r3, r4) r5 = add_key$keyring(0x0, &(0x7f0000000700)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$reject(0x13, 0x0, 0x0, 0x100000000000000b, r5) dup(0xffffffffffffffff) ioctl$int_out(r2, 0x0, 0x0) set_tid_address(0x0) [ 645.809938] audit: type=1400 audit(1575244499.290:366): avc: denied { create } for pid=25973 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0x10}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 645.986405] audit: type=1400 audit(1575244499.470:367): avc: denied { create } for pid=25979 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:54:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) [ 646.318956] audit: type=1400 audit(1575244499.800:368): avc: denied { create } for pid=25982 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 646.615131] audit: type=1400 audit(1575244500.100:369): avc: denied { create } for pid=25989 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:55:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:55:00 executing program 4: creat(0x0, 0x198) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) keyctl$assume_authority(0x10, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x14) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x82) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) syz_genetlink_get_family_id$ipvs(0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)={0x2, 0x0, 0xfd}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) [ 646.862996] audit: type=1400 audit(1575244500.350:370): avc: denied { create } for pid=25996 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:55:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 647.537721] audit: type=1400 audit(1575244501.020:371): avc: denied { create } for pid=26018 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 647.843205] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p 23:55:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socketpair$unix(0x1, 0x3, 0x0, 0x0) gettid() recvfrom(r0, &(0x7f00000002c0)=""/115, 0x73, 0x10222, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 23:55:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x5}, 0x2000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000280)='./file0/file0\x00', 0x40) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/policy\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = getpid() ptrace$getsig(0x2, r3, 0xffffffffff600003, &(0x7f0000000040)) r4 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r6, &(0x7f0000000000)={0x15}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r8, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup3(r9, r10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r11, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r8, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r7, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r3, r6, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r12}, 0x30) r13 = getpid() ptrace$getsig(0x2, r13, 0xffffffffff600003, &(0x7f0000000040)) r14 = epoll_create1(0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r15, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r14, 0x3, r15, &(0x7f0000000000)={0x15}) r16 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r17, 0x10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup3(r18, r19, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r20, 0x446, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x9, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x2, 0xfffffffc}, 0x0, 0x0, 0x0, &(0x7f0000000340)=0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x1003}}, 0x31f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r17, 0x0, 0x4, &(0x7f0000000240)='/.@\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, r16, 0x0, 0x5, &(0x7f0000001d80)='user\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)='wlan0)&\x00', r21}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r13, r15, 0x0, 0x8, &(0x7f0000000480)='\x00@\x00\x00\x00\x00\x00\x00', r21}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0x13b) dup2(r1, r2) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/validatetrans\x00', 0x1, 0x0) r23 = socket$inet(0x2, 0x0, 0x80) dup2(r23, r5) shutdown(r22, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "a4fe62dd96332fbf", "bf2c6726accff3a07f9bcd067ca02202894ce74c6a2c8868a544dd49df48b58a", "c4cc154b", "652949b793fa1cfa"}, 0x38) r24 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r25 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r26 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r26, 0x2007fff) dup3(r26, r25, 0x0) sendmsg$TIPC_NL_NET_GET(r24, &(0x7f0000000240)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[]}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x104, 0x2000000000011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r27, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aac8}], 0x1, 0x0) write$FUSE_NOTIFY_DELETE(r27, &(0x7f0000000700)=ANY=[@ANYBLOB="680000000600000000ac3d9dd2dbe6bfb408ed63129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86791c9f841935de975f097ef3591222705ec10f000000000000476b0aa600bae52227360000000008b395313cc0202fed3e82f78baa"], 0x68) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x85004, 0x0) 23:55:01 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) [ 648.477462] loop4: p1 size 2 extends beyond EOD, truncated [ 648.507688] loop4: p4 start 1854537728 is beyond EOD, truncated [ 648.541345] loop4: p5 start 1854537728 is beyond EOD, truncated [ 648.566083] loop4: p6 start 1854537728 is beyond EOD, truncated [ 648.587159] loop4: p7 start 1854537728 is beyond EOD, truncated [ 648.610390] loop4: p8 start 1854537728 is beyond EOD, truncated [ 648.631260] loop4: p9 start 1854537728 is beyond EOD, truncated [ 648.660663] loop4: p10 start 1854537728 is beyond EOD, truncated [ 648.687142] loop4: p11 start 1854537728 is beyond EOD, truncated [ 648.718375] loop4: p12 start 1854537728 is beyond EOD, truncated [ 648.756362] loop4: p13 start 1854537728 is beyond EOD, truncated [ 648.825844] loop4: p14 start 1854537728 is beyond EOD, truncated [ 648.835820] loop4: p15 start 1854537728 is beyond EOD, truncated [ 648.861871] loop4: p16 start 1854537728 is beyond EOD, truncated 23:55:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 648.868172] loop4: p17 start 1854537728 is beyond EOD, truncated [ 648.901909] loop4: p18 start 1854537728 is beyond EOD, truncated [ 648.908192] loop4: p19 start 1854537728 is beyond EOD, truncated [ 648.953408] loop4: p20 start 1854537728 is beyond EOD, truncated [ 648.992345] loop4: p21 start 1854537728 is beyond EOD, truncated [ 649.033957] loop4: p22 start 1854537728 is beyond EOD, truncated 23:55:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socketpair$unix(0x1, 0x3, 0x0, 0x0) gettid() recvfrom(r0, &(0x7f00000002c0)=""/115, 0x73, 0x10222, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) [ 649.084457] loop4: p23 start 1854537728 is beyond EOD, truncated [ 649.144591] loop4: p24 start 1854537728 is beyond EOD, truncated [ 649.184484] loop4: p25 start 1854537728 is beyond EOD, truncated [ 649.210676] loop4: p26 start 1854537728 is beyond EOD, truncated [ 649.217004] loop4: p27 start 1854537728 is beyond EOD, truncated [ 649.241709] loop4: p28 start 1854537728 is beyond EOD, truncated [ 649.247986] loop4: p29 start 1854537728 is beyond EOD, truncated [ 649.272310] loop4: p30 start 1854537728 is beyond EOD, truncated [ 649.296376] loop4: p31 start 1854537728 is beyond EOD, truncated [ 649.327313] loop4: p32 start 1854537728 is beyond EOD, truncated [ 649.372222] loop4: p33 start 1854537728 is beyond EOD, truncated [ 649.433587] loop4: p34 start 1854537728 is beyond EOD, truncated 23:55:02 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 23:55:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0x10}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 649.479511] loop4: p35 start 1854537728 is beyond EOD, truncated [ 649.512693] loop4: p36 start 1854537728 is beyond EOD, truncated [ 649.519002] loop4: p37 start 1854537728 is beyond EOD, truncated [ 649.616406] loop4: p38 start 1854537728 is beyond EOD, [ 649.656129] audit_printk_skb: 12 callbacks suppressed [ 649.656172] audit: type=1400 audit(1575244503.140:376): avc: denied { create } for pid=26046 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 649.882523] truncated 23:55:03 executing program 1: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x0, 0x0, 0x0}) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) [ 649.901256] loop4: p39 start 1854537728 is beyond EOD, truncated [ 649.952475] loop4: p40 start 1854537728 is beyond EOD, truncated [ 649.978287] loop4: p41 start 1854537728 is beyond EOD, truncated [ 650.023675] loop4: p42 start 1854537728 is beyond EOD, truncated [ 650.080158] loop4: p43 start 1854537728 is beyond EOD, truncated [ 650.134367] loop4: p44 start 1854537728 is beyond EOD, truncated [ 650.179937] loop4: p45 start 1854537728 is beyond EOD, truncated 23:55:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") [ 650.214968] loop4: p46 start 1854537728 is beyond EOD, truncated [ 650.256281] loop4: p47 start 1854537728 is beyond EOD, truncated 23:55:03 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) [ 650.292238] loop4: p48 start 1854537728 is beyond EOD, truncated [ 650.343951] loop4: p49 start 1854537728 is beyond EOD, truncated [ 650.379338] loop4: p50 start 1854537728 is beyond EOD, truncated [ 650.411886] loop4: p51 start 1854537728 is beyond EOD, truncated [ 650.418168] loop4: p52 start 1854537728 is beyond EOD, truncated [ 650.451709] loop4: p53 start 1854537728 is beyond EOD, truncated [ 650.458076] loop4: p54 start 1854537728 is beyond EOD, truncated [ 650.499096] loop4: p55 start 1854537728 is beyond EOD, truncated [ 650.551441] loop4: p56 start 1854537728 is beyond EOD, truncated [ 650.559509] loop4: p57 start 1854537728 is beyond EOD, truncated [ 650.598542] loop4: p58 start 1854537728 is beyond EOD, truncated [ 650.607595] loop4: p59 start 1854537728 is beyond EOD, truncated [ 650.652629] loop4: p60 start 1854537728 is beyond EOD, truncated [ 650.658914] loop4: p61 start 1854537728 is beyond EOD, truncated [ 650.705197] loop4: p62 start 1854537728 is beyond EOD, truncated [ 650.724641] loop4: p63 start 1854537728 is beyond EOD, truncated [ 650.769042] loop4: p64 start 1854537728 is beyond EOD, truncated [ 650.790468] loop4: p65 start 1854537728 is beyond EOD, truncated [ 650.829215] loop4: p66 start 1854537728 is beyond EOD, truncated [ 650.859715] loop4: p67 start 1854537728 is beyond EOD, truncated [ 650.922801] loop4: p68 start 1854537728 is beyond EOD, truncated [ 650.930060] loop4: p69 start 1854537728 is beyond EOD, truncated [ 650.977406] loop4: p70 start 1854537728 is beyond EOD, truncated [ 651.000397] loop4: p71 start 1854537728 is beyond EOD, truncated [ 651.032629] loop4: p72 start 1854537728 is beyond EOD, truncated [ 651.052716] loop4: p73 start 1854537728 is beyond EOD, truncated [ 651.081746] loop4: p74 start 1854537728 is beyond EOD, truncated [ 651.088045] loop4: p75 start 1854537728 is beyond EOD, truncated [ 651.121853] loop4: p76 start 1854537728 is beyond EOD, truncated [ 651.128161] loop4: p77 start 1854537728 is beyond EOD, truncated [ 651.147275] loop4: p78 start 1854537728 is beyond EOD, truncated [ 651.171748] loop4: p79 start 1854537728 is beyond EOD, truncated [ 651.178031] loop4: p80 start 1854537728 is beyond EOD, truncated [ 651.205462] loop4: p81 start 1854537728 is beyond EOD, truncated [ 651.227137] loop4: p82 start 1854537728 is beyond EOD, truncated [ 651.243201] loop4: p83 start 1854537728 is beyond EOD, truncated [ 651.265436] loop4: p84 start 1854537728 is beyond EOD, truncated [ 651.282814] loop4: p85 start 1854537728 is beyond EOD, truncated [ 651.290412] loop4: p86 start 1854537728 is beyond EOD, truncated [ 651.299090] loop4: p87 start 1854537728 is beyond EOD, truncated [ 651.307881] loop4: p88 start 1854537728 is beyond EOD, truncated [ 651.316602] loop4: p89 start 1854537728 is beyond EOD, truncated [ 651.325396] loop4: p90 start 1854537728 is beyond EOD, truncated [ 651.334082] loop4: p91 start 1854537728 is beyond EOD, truncated [ 651.343054] loop4: p92 start 1854537728 is beyond EOD, truncated [ 651.350432] loop4: p93 start 1854537728 is beyond EOD, truncated [ 651.359183] loop4: p94 start 1854537728 is beyond EOD, truncated [ 651.367955] loop4: p95 start 1854537728 is beyond EOD, truncated [ 651.376650] loop4: p96 start 1854537728 is beyond EOD, truncated [ 651.385334] loop4: p97 start 1854537728 is beyond EOD, truncated [ 651.393918] loop4: p98 start 1854537728 is beyond EOD, truncated [ 651.400336] loop4: p99 start 1854537728 is beyond EOD, truncated [ 651.409244] loop4: p100 start 1854537728 is beyond EOD, truncated [ 651.418137] loop4: p101 start 1854537728 is beyond EOD, truncated [ 651.427038] loop4: p102 start 1854537728 is beyond EOD, truncated [ 651.435812] loop4: p103 start 1854537728 is beyond EOD, truncated [ 651.444715] loop4: p104 start 1854537728 is beyond EOD, truncated [ 651.453488] loop4: p105 start 1854537728 is beyond EOD, truncated [ 651.465269] loop4: p106 start 1854537728 is beyond EOD, truncated [ 651.471903] loop4: p107 start 1854537728 is beyond EOD, truncated [ 651.478392] loop4: p108 start 1854537728 is beyond EOD, truncated [ 651.487329] loop4: p109 start 1854537728 is beyond EOD, truncated [ 651.496091] loop4: p110 start 1854537728 is beyond EOD, truncated [ 651.505945] loop4: p111 start 1854537728 is beyond EOD, truncated [ 651.516438] loop4: p112 start 1854537728 is beyond EOD, truncated [ 651.527617] loop4: p113 start 1854537728 is beyond EOD, truncated [ 651.537936] loop4: p114 start 1854537728 is beyond EOD, truncated [ 651.548294] loop4: p115 start 1854537728 is beyond EOD, truncated [ 651.558692] loop4: p116 start 1854537728 is beyond EOD, truncated [ 651.569955] loop4: p117 start 1854537728 is beyond EOD, truncated [ 651.579533] loop4: p118 start 1854537728 is beyond EOD, truncated [ 651.589098] loop4: p119 start 1854537728 is beyond EOD, truncated [ 651.599427] loop4: p120 start 1854537728 is beyond EOD, truncated [ 651.609877] loop4: p121 start 1854537728 is beyond EOD, truncated [ 651.619430] loop4: p122 start 1854537728 is beyond EOD, truncated [ 651.629928] loop4: p123 start 1854537728 is beyond EOD, truncated [ 651.639641] loop4: p124 start 1854537728 is beyond EOD, truncated [ 651.650104] loop4: p125 start 1854537728 is beyond EOD, truncated [ 651.660441] loop4: p126 start 1854537728 is beyond EOD, truncated [ 651.670007] loop4: p127 start 1854537728 is beyond EOD, truncated [ 651.679555] loop4: p128 start 1854537728 is beyond EOD, truncated [ 651.689143] loop4: p129 start 1854537728 is beyond EOD, truncated [ 651.699658] loop4: p130 start 1854537728 is beyond EOD, truncated [ 651.709083] loop4: p131 start 1854537728 is beyond EOD, truncated [ 651.716632] loop4: p132 start 1854537728 is beyond EOD, truncated [ 651.723130] loop4: p133 start 1854537728 is beyond EOD, truncated [ 651.729489] loop4: p134 start 1854537728 is beyond EOD, truncated [ 651.735881] loop4: p135 start 1854537728 is beyond EOD, truncated [ 651.742369] loop4: p136 start 1854537728 is beyond EOD, truncated [ 651.748705] loop4: p137 start 1854537728 is beyond EOD, truncated [ 651.755089] loop4: p138 start 1854537728 is beyond EOD, truncated [ 651.762162] loop4: p139 start 1854537728 is beyond EOD, truncated [ 651.768748] loop4: p140 start 1854537728 is beyond EOD, truncated [ 651.775238] loop4: p141 start 1854537728 is beyond EOD, truncated [ 651.781622] loop4: p142 start 1854537728 is beyond EOD, truncated [ 651.787967] loop4: p143 start 1854537728 is beyond EOD, truncated [ 651.794428] loop4: p144 start 1854537728 is beyond EOD, truncated [ 651.800886] loop4: p145 start 1854537728 is beyond EOD, truncated [ 651.807242] loop4: p146 start 1854537728 is beyond EOD, truncated [ 651.813626] loop4: p147 start 1854537728 is beyond EOD, truncated [ 651.819982] loop4: p148 start 1854537728 is beyond EOD, truncated [ 651.826364] loop4: p149 start 1854537728 is beyond EOD, truncated [ 651.832744] loop4: p150 start 1854537728 is beyond EOD, truncated [ 651.839093] loop4: p151 start 1854537728 is beyond EOD, truncated [ 651.845612] loop4: p152 start 1854537728 is beyond EOD, truncated [ 651.852029] loop4: p153 start 1854537728 is beyond EOD, truncated [ 651.858365] loop4: p154 start 1854537728 is beyond EOD, truncated [ 651.864753] loop4: p155 start 1854537728 is beyond EOD, truncated [ 651.871860] loop4: p156 start 1854537728 is beyond EOD, truncated [ 651.878387] loop4: p157 start 1854537728 is beyond EOD, truncated [ 651.884763] loop4: p158 start 1854537728 is beyond EOD, truncated [ 651.891137] loop4: p159 start 1854537728 is beyond EOD, truncated [ 651.897506] loop4: p160 start 1854537728 is beyond EOD, truncated [ 651.903892] loop4: p161 start 1854537728 is beyond EOD, truncated [ 651.910235] loop4: p162 start 1854537728 is beyond EOD, truncated [ 651.916713] loop4: p163 start 1854537728 is beyond EOD, truncated [ 651.923124] loop4: p164 start 1854537728 is beyond EOD, truncated [ 651.929460] loop4: p165 start 1854537728 is beyond EOD, truncated [ 651.935857] loop4: p166 start 1854537728 is beyond EOD, truncated [ 651.942227] loop4: p167 start 1854537728 is beyond EOD, truncated [ 651.948562] loop4: p168 start 1854537728 is beyond EOD, truncated [ 651.954998] loop4: p169 start 1854537728 is beyond EOD, truncated [ 651.961372] loop4: p170 start 1854537728 is beyond EOD, truncated [ 651.967724] loop4: p171 start 1854537728 is beyond EOD, truncated [ 651.974146] loop4: p172 start 1854537728 is beyond EOD, truncated [ 651.980551] loop4: p173 start 1854537728 is beyond EOD, truncated [ 651.986912] loop4: p174 start 1854537728 is beyond EOD, truncated [ 651.993413] loop4: p175 start 1854537728 is beyond EOD, truncated [ 651.999881] loop4: p176 start 1854537728 is beyond EOD, truncated [ 652.006280] loop4: p177 start 1854537728 is beyond EOD, truncated [ 652.012663] loop4: p178 start 1854537728 is beyond EOD, truncated [ 652.019056] loop4: p179 start 1854537728 is beyond EOD, truncated [ 652.025440] loop4: p180 start 1854537728 is beyond EOD, truncated [ 652.032013] loop4: p181 start 1854537728 is beyond EOD, truncated [ 652.038395] loop4: p182 start 1854537728 is beyond EOD, truncated [ 652.044794] loop4: p183 start 1854537728 is beyond EOD, truncated [ 652.051185] loop4: p184 start 1854537728 is beyond EOD, truncated [ 652.057583] loop4: p185 start 1854537728 is beyond EOD, truncated [ 652.063962] loop4: p186 start 1854537728 is beyond EOD, truncated [ 652.070322] loop4: p187 start 1854537728 is beyond EOD, truncated [ 652.076721] loop4: p188 start 1854537728 is beyond EOD, truncated [ 652.083102] loop4: p189 start 1854537728 is beyond EOD, truncated [ 652.089452] loop4: p190 start 1854537728 is beyond EOD, truncated [ 652.095844] loop4: p191 start 1854537728 is beyond EOD, truncated [ 652.102238] loop4: p192 start 1854537728 is beyond EOD, truncated [ 652.108588] loop4: p193 start 1854537728 is beyond EOD, truncated [ 652.114972] loop4: p194 start 1854537728 is beyond EOD, truncated [ 652.121335] loop4: p195 start 1854537728 is beyond EOD, truncated [ 652.127675] loop4: p196 start 1854537728 is beyond EOD, truncated [ 652.134065] loop4: p197 start 1854537728 is beyond EOD, truncated [ 652.140421] loop4: p198 start 1854537728 is beyond EOD, truncated [ 652.146795] loop4: p199 start 1854537728 is beyond EOD, truncated [ 652.153174] loop4: p200 start 1854537728 is beyond EOD, truncated [ 652.159505] loop4: p201 start 1854537728 is beyond EOD, truncated [ 652.165875] loop4: p202 start 1854537728 is beyond EOD, truncated [ 652.172258] loop4: p203 start 1854537728 is beyond EOD, truncated [ 652.178605] loop4: p204 start 1854537728 is beyond EOD, truncated [ 652.184978] loop4: p205 start 1854537728 is beyond EOD, truncated [ 652.191375] loop4: p206 start 1854537728 is beyond EOD, truncated [ 652.197733] loop4: p207 start 1854537728 is beyond EOD, truncated [ 652.204146] loop4: p208 start 1854537728 is beyond EOD, truncated [ 652.210575] loop4: p209 start 1854537728 is beyond EOD, truncated [ 652.216948] loop4: p210 start 1854537728 is beyond EOD, truncated [ 652.223323] loop4: p211 start 1854537728 is beyond EOD, truncated [ 652.229709] loop4: p212 start 1854537728 is beyond EOD, truncated [ 652.236093] loop4: p213 start 1854537728 is beyond EOD, truncated [ 652.242499] loop4: p214 start 1854537728 is beyond EOD, truncated [ 652.248875] loop4: p215 start 1854537728 is beyond EOD, truncated [ 652.255283] loop4: p216 start 1854537728 is beyond EOD, truncated [ 652.261669] loop4: p217 start 1854537728 is beyond EOD, truncated [ 652.268031] loop4: p218 start 1854537728 is beyond EOD, truncated [ 652.274422] loop4: p219 start 1854537728 is beyond EOD, truncated [ 652.280794] loop4: p220 start 1854537728 is beyond EOD, truncated [ 652.287163] loop4: p221 start 1854537728 is beyond EOD, truncated [ 652.293605] loop4: p222 start 1854537728 is beyond EOD, truncated [ 652.299966] loop4: p223 start 1854537728 is beyond EOD, truncated [ 652.306464] loop4: p224 start 1854537728 is beyond EOD, truncated [ 652.312852] loop4: p225 start 1854537728 is beyond EOD, truncated [ 652.319188] loop4: p226 start 1854537728 is beyond EOD, truncated [ 652.325565] loop4: p227 start 1854537728 is beyond EOD, truncated [ 652.331945] loop4: p228 start 1854537728 is beyond EOD, truncated [ 652.338646] loop4: p229 start 1854537728 is beyond EOD, truncated [ 652.345084] loop4: p230 start 1854537728 is beyond EOD, truncated [ 652.351813] loop4: p231 start 1854537728 is beyond EOD, truncated [ 652.358187] loop4: p232 start 1854537728 is beyond EOD, truncated [ 652.364569] loop4: p233 start 1854537728 is beyond EOD, truncated [ 652.370948] loop4: p234 start 1854537728 is beyond EOD, truncated [ 652.377329] loop4: p235 start 1854537728 is beyond EOD, truncated [ 652.383711] loop4: p236 start 1854537728 is beyond EOD, truncated [ 652.390058] loop4: p237 start 1854537728 is beyond EOD, truncated [ 652.396525] loop4: p238 start 1854537728 is beyond EOD, truncated [ 652.402891] loop4: p239 start 1854537728 is beyond EOD, truncated [ 652.409248] loop4: p240 start 1854537728 is beyond EOD, truncated [ 652.415648] loop4: p241 start 1854537728 is beyond EOD, truncated [ 652.422038] loop4: p242 start 1854537728 is beyond EOD, truncated [ 652.428377] loop4: p243 start 1854537728 is beyond EOD, truncated [ 652.434756] loop4: p244 start 1854537728 is beyond EOD, truncated [ 652.441131] loop4: p245 start 1854537728 is beyond EOD, truncated [ 652.447487] loop4: p246 start 1854537728 is beyond EOD, truncated [ 652.453890] loop4: p247 start 1854537728 is beyond EOD, truncated [ 652.460244] loop4: p248 start 1854537728 is beyond EOD, truncated [ 652.466712] loop4: p249 start 1854537728 is beyond EOD, truncated [ 652.473113] loop4: p250 start 1854537728 is beyond EOD, truncated [ 652.479469] loop4: p251 start 1854537728 is beyond EOD, truncated [ 652.485849] loop4: p252 start 1854537728 is beyond EOD, truncated [ 652.492265] loop4: p253 start 1854537728 is beyond EOD, truncated [ 652.498616] loop4: p254 start 1854537728 is beyond EOD, truncated [ 652.505009] loop4: p255 start 1854537728 is beyond EOD, truncated 23:55:06 executing program 4: creat(0x0, 0x198) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) keyctl$assume_authority(0x10, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x14) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x82) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) syz_genetlink_get_family_id$ipvs(0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)={0x2, 0x0, 0xfd}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 23:55:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 23:55:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c785255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab569f8e39808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd113acf060c105020d4882fc399eaabc787f0db64a04", @ANYRESHEX=0x0, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296c43b3897cc275fd8fc333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad0300dfdaf3d0fef215586de3c101e4f8d1b12b"], 0x0, 0x105}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:55:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socketpair$unix(0x1, 0x3, 0x0, 0x0) gettid() recvfrom(r0, &(0x7f00000002c0)=""/115, 0x73, 0x10222, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 23:55:06 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 23:55:06 executing program 0: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="13cd0f0558c713050d77cacae3b3a2e684e8009fe3eaeb7f6bf50e55207b16715232735c2bab327c07d4d3157d656da43c5285c87a4a0c6bbd9431844f1697036701438f6f5b27193981f019af939897a331b013e31e4e35b2d757d29899fd01a08ada9e6ac5e075e228322969ecb07c738972f21f5cfc4ba839a57a0b428d940793064f1875082bdccd88a0d0630b68fdb5719949cda618961aad60f3"], 0x9d}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB="12ec93badbaa8968bbbefaa5ec1ffc22cf3e5f5e6576ec90b40d3b620913339c92037966edc9065bae616ab9614614aadb17ecb1cc07b5fef133aa83f74112903469c2b7e17921c4982e64119b88280e11d428b188a3e986191f7fe6616d3f26ecfa58d19d9694438f36680bf2cf9aa78937dbf8e11fef596febff9bdd3055fb71e261ed86fdb84cd0a3648901000000000000007ea9bba48311810585f00ed6608edadcd120277b19deef9c81ef4d670a499eaec5774720", @ANYPTR64, @ANYRES64, @ANYPTR64], 0x0, 0xe4}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:55:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 23:55:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socketpair$unix(0x1, 0x3, 0x0, 0x0) gettid() recvfrom(r0, &(0x7f00000002c0)=""/115, 0x73, 0x10222, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) [ 653.228338] audit: type=1400 audit(1575244506.710:377): avc: denied { create } for pid=26097 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:55:07 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x00'/75, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYBLOB="a9505bd65813817c2a3f13539857447fe09181da29e999ca7d56011f2ed8cebd808334b58f4e00d205a228daa1b6bd3d24f37689f19d8377a7843a95c658caee"], 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, &(0x7f0000000040), r1, 0x0, 0x100000200002, 0x0) 23:55:07 executing program 5: r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) fallocate(r0, 0x40, 0x0, 0x8000) 23:55:07 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x0, @random="edbd76f3c724"}, 0x0, {0x2, 0x0, @dev}, 'bridge_slave_0\x00'}) [ 653.575474] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p 23:55:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000005000000", 0x58}], 0x1) [ 654.133325] loop4: p1 size 2 extends beyond EOD, truncated [ 654.190487] loop4: p4 start 1854537728 is beyond EOD, truncated [ 654.235281] loop4: p5 start 1854537728 is beyond EOD, truncated [ 654.263557] loop4: p6 start 1854537728 is beyond EOD, truncated [ 654.292865] loop4: p7 start 1854537728 is beyond EOD, truncated [ 654.328399] loop4: p8 start 1854537728 is beyond EOD, truncated [ 654.357717] loop4: p9 start 1854537728 is beyond EOD, truncated [ 654.401924] loop4: p10 start 1854537728 is beyond EOD, truncated [ 654.408276] loop4: p11 start 1854537728 is beyond EOD, truncated [ 654.425027] loop4: p12 start 1854537728 is beyond EOD, truncated [ 654.452656] loop4: p13 start 1854537728 is beyond EOD, truncated [ 654.459093] loop4: p14 start 1854537728 is beyond EOD, truncated [ 654.488247] loop4: p15 start 1854537728 is beyond EOD, truncated [ 654.500119] loop4: p16 start 1854537728 is beyond EOD, truncated [ 654.509763] loop4: p17 start 1854537728 is beyond EOD, truncated [ 654.523370] loop4: p18 start 1854537728 is beyond EOD, truncated [ 654.539153] loop4: p19 start 1854537728 is beyond EOD, truncated [ 654.571126] loop4: p20 start 1854537728 is beyond EOD, truncated [ 654.601571] loop4: p21 start 1854537728 is beyond EOD, truncated [ 654.620414] loop4: p22 start 1854537728 is beyond EOD, truncated [ 654.642613] loop4: p23 start 1854537728 is beyond EOD, truncated [ 654.675230] loop4: p24 start 1854537728 is beyond EOD, truncated [ 654.703556] loop4: p25 start 1854537728 is beyond EOD, truncated [ 654.730480] loop4: p26 start 1854537728 is beyond EOD, truncated [ 654.749379] loop4: p27 start 1854537728 is beyond EOD, truncated [ 654.770089] loop4: p28 start 1854537728 is beyond EOD, truncated [ 654.777840] loop4: p29 start 1854537728 is beyond EOD, truncated [ 654.785914] loop4: p30 start 1854537728 is beyond EOD, truncated [ 654.793846] loop4: p31 start 1854537728 is beyond EOD, truncated [ 654.801629] loop4: p32 start 1854537728 is beyond EOD, truncated [ 654.812140] loop4: p33 start 1854537728 is beyond EOD, truncated [ 654.832861] loop4: p34 start 1854537728 is beyond EOD, truncated [ 654.852567] loop4: p35 start 1854537728 is beyond EOD, truncated [ 654.875700] loop4: p36 start 1854537728 is beyond EOD, truncated [ 654.899393] loop4: p37 start 1854537728 is beyond EOD, truncated [ 654.909723] loop4: p38 start 1854537728 is beyond EOD, truncated [ 654.919490] loop4: p39 start 1854537728 is beyond EOD, truncated [ 654.929258] loop4: p40 start 1854537728 is beyond EOD, truncated [ 654.939885] loop4: p41 start 1854537728 is beyond EOD, truncated [ 654.948857] loop4: p42 start 1854537728 is beyond EOD, truncated [ 654.959510] loop4: p43 start 1854537728 is beyond EOD, truncated [ 654.969566] loop4: p44 start 1854537728 is beyond EOD, truncated [ 654.979401] loop4: p45 start 1854537728 is beyond EOD, truncated [ 654.990556] loop4: p46 start 1854537728 is beyond EOD, truncated [ 654.998758] loop4: p47 start 1854537728 is beyond EOD, truncated [ 655.009089] loop4: p48 start 1854537728 is beyond EOD, truncated [ 655.019706] loop4: p49 start 1854537728 is beyond EOD, truncated [ 655.029402] loop4: p50 start 1854537728 is beyond EOD, truncated [ 655.038027] loop4: p51 start 1854537728 is beyond EOD, truncated [ 655.044978] loop4: p52 start 1854537728 is beyond EOD, truncated [ 655.051739] loop4: p53 start 1854537728 is beyond EOD, truncated [ 655.058261] loop4: p54 start 1854537728 is beyond EOD, truncated [ 655.064995] loop4: p55 start 1854537728 is beyond EOD, truncated [ 655.071365] loop4: p56 start 1854537728 is beyond EOD, truncated [ 655.077911] loop4: p57 start 1854537728 is beyond EOD, truncated [ 655.084463] loop4: p58 start 1854537728 is beyond EOD, truncated [ 655.090777] loop4: p59 start 1854537728 is beyond EOD, truncated [ 655.097108] loop4: p60 start 1854537728 is beyond EOD, truncated [ 655.103596] loop4: p61 start 1854537728 is beyond EOD, truncated [ 655.109991] loop4: p62 start 1854537728 is beyond EOD, truncated [ 655.116334] loop4: p63 start 1854537728 is beyond EOD, truncated [ 655.123159] loop4: p64 start 1854537728 is beyond EOD, truncated [ 655.129585] loop4: p65 start 1854537728 is beyond EOD, truncated [ 655.136084] loop4: p66 start 1854537728 is beyond EOD, truncated [ 655.142622] loop4: p67 start 1854537728 is beyond EOD, truncated [ 655.149041] loop4: p68 start 1854537728 is beyond EOD, truncated [ 655.156209] loop4: p69 start 1854537728 is beyond EOD, truncated [ 655.162820] loop4: p70 start 1854537728 is beyond EOD, truncated [ 655.169486] loop4: p71 start 1854537728 is beyond EOD, truncated [ 655.175900] loop4: p72 start 1854537728 is beyond EOD, truncated [ 655.182523] loop4: p73 start 1854537728 is beyond EOD, truncated [ 655.188998] loop4: p74 start 1854537728 is beyond EOD, truncated [ 655.195336] loop4: p75 start 1854537728 is beyond EOD, truncated [ 655.201675] loop4: p76 start 1854537728 is beyond EOD, truncated [ 655.208386] loop4: p77 start 1854537728 is beyond EOD, truncated [ 655.214900] loop4: p78 start 1854537728 is beyond EOD, truncated [ 655.221237] loop4: p79 start 1854537728 is beyond EOD, truncated [ 655.227728] loop4: p80 start 1854537728 is beyond EOD, truncated [ 655.234206] loop4: p81 start 1854537728 is beyond EOD, truncated [ 655.240672] loop4: p82 start 1854537728 is beyond EOD, truncated [ 655.247097] loop4: p83 start 1854537728 is beyond EOD, truncated [ 655.253580] loop4: p84 start 1854537728 is beyond EOD, truncated [ 655.260147] loop4: p85 start 1854537728 is beyond EOD, truncated [ 655.267145] loop4: p86 start 1854537728 is beyond EOD, truncated [ 655.273542] loop4: p87 start 1854537728 is beyond EOD, truncated [ 655.280123] loop4: p88 start 1854537728 is beyond EOD, truncated [ 655.287074] loop4: p89 start 1854537728 is beyond EOD, truncated [ 655.293603] loop4: p90 start 1854537728 is beyond EOD, truncated [ 655.306976] loop4: p91 start 1854537728 is beyond EOD, truncated [ 655.313494] loop4: p92 start 1854537728 is beyond EOD, truncated [ 655.319839] loop4: p93 start 1854537728 is beyond EOD, truncated [ 655.326284] loop4: p94 start 1854537728 is beyond EOD, truncated [ 655.333193] loop4: p95 start 1854537728 is beyond EOD, truncated [ 655.339576] loop4: p96 start 1854537728 is beyond EOD, truncated [ 655.346558] loop4: p97 start 1854537728 is beyond EOD, truncated [ 655.352970] loop4: p98 start 1854537728 is beyond EOD, truncated [ 655.359561] loop4: p99 start 1854537728 is beyond EOD, truncated [ 655.365980] loop4: p100 start 1854537728 is beyond EOD, truncated [ 655.373597] loop4: p101 start 1854537728 is beyond EOD, truncated [ 655.380088] loop4: p102 start 1854537728 is beyond EOD, truncated [ 655.386478] loop4: p103 start 1854537728 is beyond EOD, truncated [ 655.393150] loop4: p104 start 1854537728 is beyond EOD, truncated [ 655.399849] loop4: p105 start 1854537728 is beyond EOD, truncated [ 655.406349] loop4: p106 start 1854537728 is beyond EOD, truncated [ 655.413364] loop4: p107 start 1854537728 is beyond EOD, truncated [ 655.420644] loop4: p108 start 1854537728 is beyond EOD, truncated [ 655.427095] loop4: p109 start 1854537728 is beyond EOD, truncated [ 655.433799] loop4: p110 start 1854537728 is beyond EOD, truncated [ 655.440262] loop4: p111 start 1854537728 is beyond EOD, truncated [ 655.447595] loop4: p112 start 1854537728 is beyond EOD, truncated [ 655.454392] loop4: p113 start 1854537728 is beyond EOD, truncated [ 655.460971] loop4: p114 start 1854537728 is beyond EOD, truncated [ 655.467863] loop4: p115 start 1854537728 is beyond EOD, truncated [ 655.474914] loop4: p116 start 1854537728 is beyond EOD, truncated [ 655.481794] loop4: p117 start 1854537728 is beyond EOD, truncated [ 655.488512] loop4: p118 start 1854537728 is beyond EOD, truncated [ 655.495310] loop4: p119 start 1854537728 is beyond EOD, truncated [ 655.502114] loop4: p120 start 1854537728 is beyond EOD, truncated [ 655.508787] loop4: p121 start 1854537728 is beyond EOD, truncated [ 655.515760] loop4: p122 start 1854537728 is beyond EOD, truncated [ 655.522408] loop4: p123 start 1854537728 is beyond EOD, truncated [ 655.528961] loop4: p124 start 1854537728 is beyond EOD, truncated [ 655.535454] loop4: p125 start 1854537728 is beyond EOD, truncated [ 655.542296] loop4: p126 start 1854537728 is beyond EOD, truncated [ 655.549602] loop4: p127 start 1854537728 is beyond EOD, truncated [ 655.556182] loop4: p128 start 1854537728 is beyond EOD, truncated [ 655.563225] loop4: p129 start 1854537728 is beyond EOD, truncated [ 655.569757] loop4: p130 start 1854537728 is beyond EOD, truncated [ 655.576255] loop4: p131 start 1854537728 is beyond EOD, truncated [ 655.582953] loop4: p132 start 1854537728 is beyond EOD, truncated [ 655.589351] loop4: p133 start 1854537728 is beyond EOD, truncated [ 655.595911] loop4: p134 start 1854537728 is beyond EOD, truncated [ 655.602632] loop4: p135 start 1854537728 is beyond EOD, truncated [ 655.609113] loop4: p136 start 1854537728 is beyond EOD, truncated [ 655.615776] loop4: p137 start 1854537728 is beyond EOD, truncated [ 655.622215] loop4: p138 start 1854537728 is beyond EOD, truncated [ 655.629002] loop4: p139 start 1854537728 is beyond EOD, truncated [ 655.639243] loop4: p140 start 1854537728 is beyond EOD, truncated [ 655.646078] loop4: p141 start 1854537728 is beyond EOD, truncated [ 655.653698] loop4: p142 start 1854537728 is beyond EOD, truncated [ 655.660227] loop4: p143 start 1854537728 is beyond EOD, truncated [ 655.666768] loop4: p144 start 1854537728 is beyond EOD, truncated [ 655.674013] loop4: p145 start 1854537728 is beyond EOD, truncated [ 655.680406] loop4: p146 start 1854537728 is beyond EOD, truncated [ 655.686863] loop4: p147 start 1854537728 is beyond EOD, truncated [ 655.694971] loop4: p148 start 1854537728 is beyond EOD, truncated [ 655.702620] loop4: p149 start 1854537728 is beyond EOD, truncated [ 655.709447] loop4: p150 start 1854537728 is beyond EOD, truncated [ 655.718138] loop4: p151 start 1854537728 is beyond EOD, truncated [ 655.726499] loop4: p152 start 1854537728 is beyond EOD, truncated [ 655.735234] loop4: p153 start 1854537728 is beyond EOD, truncated [ 655.744829] loop4: p154 start 1854537728 is beyond EOD, truncated [ 655.751617] loop4: p155 start 1854537728 is beyond EOD, truncated [ 655.758010] loop4: p156 start 1854537728 is beyond EOD, truncated [ 655.764904] loop4: p157 start 1854537728 is beyond EOD, truncated [ 655.771394] loop4: p158 start 1854537728 is beyond EOD, truncated [ 655.778416] loop4: p159 start 1854537728 is beyond EOD, truncated [ 655.784926] loop4: p160 start 1854537728 is beyond EOD, truncated [ 655.791619] loop4: p161 start 1854537728 is beyond EOD, truncated [ 655.798319] loop4: p162 start 1854537728 is beyond EOD, truncated [ 655.805603] loop4: p163 start 1854537728 is beyond EOD, truncated [ 655.812706] loop4: p164 start 1854537728 is beyond EOD, truncated [ 655.821167] loop4: p165 start 1854537728 is beyond EOD, truncated [ 655.827646] loop4: p166 start 1854537728 is beyond EOD, truncated [ 655.834608] loop4: p167 start 1854537728 is beyond EOD, truncated [ 655.841513] loop4: p168 start 1854537728 is beyond EOD, truncated [ 655.848346] loop4: p169 start 1854537728 is beyond EOD, truncated [ 655.855031] loop4: p170 start 1854537728 is beyond EOD, truncated [ 655.861563] loop4: p171 start 1854537728 is beyond EOD, truncated [ 655.868196] loop4: p172 start 1854537728 is beyond EOD, truncated [ 655.875036] loop4: p173 start 1854537728 is beyond EOD, truncated [ 655.881674] loop4: p174 start 1854537728 is beyond EOD, truncated [ 655.888280] loop4: p175 start 1854537728 is beyond EOD, truncated [ 655.894793] loop4: p176 start 1854537728 is beyond EOD, truncated [ 655.901435] loop4: p177 start 1854537728 is beyond EOD, truncated [ 655.908142] loop4: p178 start 1854537728 is beyond EOD, truncated [ 655.914652] loop4: p179 start 1854537728 is beyond EOD, truncated [ 655.921260] loop4: p180 start 1854537728 is beyond EOD, truncated [ 655.928731] loop4: p181 start 1854537728 is beyond EOD, truncated [ 655.936241] loop4: p182 start 1854537728 is beyond EOD, truncated [ 655.942891] loop4: p183 start 1854537728 is beyond EOD, truncated [ 655.949706] loop4: p184 start 1854537728 is beyond EOD, truncated [ 655.956585] loop4: p185 start 1854537728 is beyond EOD, truncated [ 655.963116] loop4: p186 start 1854537728 is beyond EOD, truncated [ 655.969782] loop4: p187 start 1854537728 is beyond EOD, truncated [ 655.976499] loop4: p188 start 1854537728 is beyond EOD, truncated [ 655.984263] loop4: p189 start 1854537728 is beyond EOD, truncated [ 655.990785] loop4: p190 start 1854537728 is beyond EOD, truncated [ 655.997225] loop4: p191 start 1854537728 is beyond EOD, truncated [ 656.004012] loop4: p192 start 1854537728 is beyond EOD, truncated [ 656.010575] loop4: p193 start 1854537728 is beyond EOD, truncated [ 656.017134] loop4: p194 start 1854537728 is beyond EOD, truncated [ 656.023555] loop4: p195 start 1854537728 is beyond EOD, truncated [ 656.030106] loop4: p196 start 1854537728 is beyond EOD, truncated [ 656.036767] loop4: p197 start 1854537728 is beyond EOD, truncated [ 656.043608] loop4: p198 start 1854537728 is beyond EOD, truncated [ 656.050289] loop4: p199 start 1854537728 is beyond EOD, truncated [ 656.056839] loop4: p200 start 1854537728 is beyond EOD, truncated [ 656.065445] loop4: p201 start 1854537728 is beyond EOD, truncated [ 656.072076] loop4: p202 start 1854537728 is beyond EOD, truncated [ 656.078610] loop4: p203 start 1854537728 is beyond EOD, truncated [ 656.085192] loop4: p204 start 1854537728 is beyond EOD, truncated [ 656.091948] loop4: p205 start 1854537728 is beyond EOD, truncated [ 656.098843] loop4: p206 start 1854537728 is beyond EOD, truncated [ 656.105387] loop4: p207 start 1854537728 is beyond EOD, truncated [ 656.112056] loop4: p208 start 1854537728 is beyond EOD, truncated [ 656.119236] loop4: p209 start 1854537728 is beyond EOD, truncated [ 656.125892] loop4: p210 start 1854537728 is beyond EOD, truncated [ 656.132605] loop4: p211 start 1854537728 is beyond EOD, truncated [ 656.139144] loop4: p212 start 1854537728 is beyond EOD, truncated [ 656.145847] loop4: p213 start 1854537728 is beyond EOD, truncated [ 656.153840] loop4: p214 start 1854537728 is beyond EOD, truncated [ 656.160342] loop4: p215 start 1854537728 is beyond EOD, truncated [ 656.167066] loop4: p216 start 1854537728 is beyond EOD, truncated [ 656.173572] loop4: p217 start 1854537728 is beyond EOD, truncated [ 656.180058] loop4: p218 start 1854537728 is beyond EOD, truncated [ 656.186810] loop4: p219 start 1854537728 is beyond EOD, truncated [ 656.193721] loop4: p220 start 1854537728 is beyond EOD, truncated [ 656.200136] loop4: p221 start 1854537728 is beyond EOD, truncated [ 656.206544] loop4: p222 start 1854537728 is beyond EOD, truncated [ 656.213205] loop4: p223 start 1854537728 is beyond EOD, truncated [ 656.219865] loop4: p224 start 1854537728 is beyond EOD, truncated [ 656.226294] loop4: p225 start 1854537728 is beyond EOD, truncated [ 656.232728] loop4: p226 start 1854537728 is beyond EOD, truncated [ 656.239315] loop4: p227 start 1854537728 is beyond EOD, truncated [ 656.245892] loop4: p228 start 1854537728 is beyond EOD, truncated [ 656.252448] loop4: p229 start 1854537728 is beyond EOD, truncated [ 656.259287] loop4: p230 start 1854537728 is beyond EOD, truncated [ 656.265762] loop4: p231 start 1854537728 is beyond EOD, truncated [ 656.272581] loop4: p232 start 1854537728 is beyond EOD, truncated [ 656.279202] loop4: p233 start 1854537728 is beyond EOD, truncated [ 656.285634] loop4: p234 start 1854537728 is beyond EOD, truncated [ 656.292330] loop4: p235 start 1854537728 is beyond EOD, truncated [ 656.298935] loop4: p236 start 1854537728 is beyond EOD, truncated [ 656.305526] loop4: p237 start 1854537728 is beyond EOD, truncated [ 656.318312] loop4: p238 start 1854537728 is beyond EOD, truncated [ 656.325442] loop4: p239 start 1854537728 is beyond EOD, truncated [ 656.331916] loop4: p240 start 1854537728 is beyond EOD, truncated [ 656.338358] loop4: p241 start 1854537728 is beyond EOD, truncated [ 656.344800] loop4: p242 start 1854537728 is beyond EOD, truncated [ 656.351715] loop4: p243 start 1854537728 is beyond EOD, truncated [ 656.358721] loop4: p244 start 1854537728 is beyond EOD, truncated [ 656.365655] loop4: p245 start 1854537728 is beyond EOD, truncated [ 656.372557] loop4: p246 start 1854537728 is beyond EOD, truncated [ 656.378925] loop4: p247 start 1854537728 is beyond EOD, truncated [ 656.385878] loop4: p248 start 1854537728 is beyond EOD, truncated [ 656.392512] loop4: p249 start 1854537728 is beyond EOD, truncated [ 656.398947] loop4: p250 start 1854537728 is beyond EOD, truncated [ 656.405656] loop4: p251 start 1854537728 is beyond EOD, truncated [ 656.412333] loop4: p252 start 1854537728 is beyond EOD, truncated [ 656.419304] loop4: p253 start 1854537728 is beyond EOD, truncated [ 656.425936] loop4: p254 start 1854537728 is beyond EOD, truncated [ 656.432563] loop4: p255 start 1854537728 is beyond EOD, truncated 23:55:09 executing program 4: creat(0x0, 0x198) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) keyctl$assume_authority(0x10, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x14) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x82) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) syz_genetlink_get_family_id$ipvs(0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)={0x2, 0x0, 0xfd}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 23:55:09 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x00'/75, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYBLOB="a9505bd65813817c2a3f13539857447fe09181da29e999ca7d56011f2ed8cebd808334b58f4e00d205a228daa1b6bd3d24f37689f19d8377a7843a95c658caee"], 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, &(0x7f0000000040), r1, 0x0, 0x100000200002, 0x0) 23:55:09 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x0, @random="edbd76f3c724"}, 0x0, {0x2, 0x0, @dev}, 'bridge_slave_0\x00'}) 23:55:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x18) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket(0x10, 0x6, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = getpgrp(0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/dev_snmp6\x00') syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x10001) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, 0x0, 0x40004) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "00000000020d6bfded2342273716fbaa28f7be83"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) chdir(0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x6, 0x5) 23:55:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000005000000", 0x58}], 0x1) 23:55:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x7}}) 23:55:10 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x0, @random="edbd76f3c724"}, 0x0, {0x2, 0x0, @dev}, 'bridge_slave_0\x00'}) 23:55:10 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x00'/75, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYBLOB="a9505bd65813817c2a3f13539857447fe09181da29e999ca7d56011f2ed8cebd808334b58f4e00d205a228daa1b6bd3d24f37689f19d8377a7843a95c658caee"], 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, &(0x7f0000000040), r1, 0x0, 0x100000200002, 0x0) 23:55:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x7}}) 23:55:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000005000000", 0x58}], 0x1) 23:55:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) [ 657.112567] audit: type=1400 audit(1575244510.600:378): avc: denied { create } for pid=26148 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:55:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x7}}) [ 657.397287] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p [ 657.809819] loop4: p1 size 2 extends beyond EOD, truncated [ 657.868746] loop4: p4 start 1854537728 is beyond EOD, truncated [ 657.905515] loop4: p5 start 1854537728 is beyond EOD, truncated [ 657.927170] loop4: p6 start 1854537728 is beyond EOD, truncated [ 657.948933] loop4: p7 start 1854537728 is beyond EOD, truncated [ 657.975668] loop4: p8 start 1854537728 is beyond EOD, truncated [ 657.998666] loop4: p9 start 1854537728 is beyond EOD, truncated [ 658.019223] loop4: p10 start 1854537728 is beyond EOD, truncated [ 658.041456] loop4: p11 start 1854537728 is beyond EOD, truncated [ 658.061708] loop4: p12 start 1854537728 is beyond EOD, truncated [ 658.083902] loop4: p13 start 1854537728 is beyond EOD, truncated [ 658.094132] loop4: p14 start 1854537728 is beyond EOD, truncated [ 658.103305] loop4: p15 start 1854537728 is beyond EOD, truncated [ 658.111584] loop4: p16 start 1854537728 is beyond EOD, truncated [ 658.119766] loop4: p17 start 1854537728 is beyond EOD, truncated [ 658.128102] loop4: p18 start 1854537728 is beyond EOD, truncated [ 658.135763] loop4: p19 start 1854537728 is beyond EOD, truncated [ 658.142457] loop4: p20 start 1854537728 is beyond EOD, truncated [ 658.150919] loop4: p21 start 1854537728 is beyond EOD, truncated [ 658.158404] loop4: p22 start 1854537728 is beyond EOD, truncated [ 658.170265] loop4: p23 start 1854537728 is beyond EOD, truncated [ 658.179579] loop4: p24 start 1854537728 is beyond EOD, truncated [ 658.188369] loop4: p25 start 1854537728 is beyond EOD, truncated [ 658.197928] loop4: p26 start 1854537728 is beyond EOD, truncated [ 658.207383] loop4: p27 start 1854537728 is beyond EOD, truncated [ 658.217141] loop4: p28 start 1854537728 is beyond EOD, truncated [ 658.226575] loop4: p29 start 1854537728 is beyond EOD, truncated [ 658.237034] loop4: p30 start 1854537728 is beyond EOD, truncated [ 658.245790] loop4: p31 start 1854537728 is beyond EOD, truncated [ 658.255597] loop4: p32 start 1854537728 is beyond EOD, truncated [ 658.265776] loop4: p33 start 1854537728 is beyond EOD, truncated [ 658.275360] loop4: p34 start 1854537728 is beyond EOD, truncated [ 658.285077] loop4: p35 start 1854537728 is beyond EOD, truncated [ 658.295854] loop4: p36 start 1854537728 is beyond EOD, truncated [ 658.305460] loop4: p37 start 1854537728 is beyond EOD, truncated [ 658.315481] loop4: p38 start 1854537728 is beyond EOD, truncated [ 658.325633] loop4: p39 start 1854537728 is beyond EOD, truncated [ 658.336752] loop4: p40 start 1854537728 is beyond EOD, truncated [ 658.345910] loop4: p41 start 1854537728 is beyond EOD, truncated [ 658.356694] loop4: p42 start 1854537728 is beyond EOD, truncated [ 658.368684] loop4: p43 start 1854537728 is beyond EOD, truncated [ 658.378945] loop4: p44 start 1854537728 is beyond EOD, truncated [ 658.388415] loop4: p45 start 1854537728 is beyond EOD, truncated [ 658.398509] loop4: p46 start 1854537728 is beyond EOD, truncated [ 658.409296] loop4: p47 start 1854537728 is beyond EOD, truncated [ 658.418037] loop4: p48 start 1854537728 is beyond EOD, truncated [ 658.427520] loop4: p49 start 1854537728 is beyond EOD, truncated [ 658.437216] loop4: p50 start 1854537728 is beyond EOD, truncated [ 658.447349] loop4: p51 start 1854537728 is beyond EOD, truncated [ 658.457143] loop4: p52 start 1854537728 is beyond EOD, truncated [ 658.467637] loop4: p53 start 1854537728 is beyond EOD, truncated [ 658.477593] loop4: p54 start 1854537728 is beyond EOD, truncated [ 658.488117] loop4: p55 start 1854537728 is beyond EOD, truncated [ 658.499111] loop4: p56 start 1854537728 is beyond EOD, truncated [ 658.511413] loop4: p57 start 1854537728 is beyond EOD, truncated [ 658.519723] loop4: p58 start 1854537728 is beyond EOD, truncated [ 658.541821] loop4: p59 start 1854537728 is beyond EOD, truncated [ 658.553251] loop4: p60 start 1854537728 is beyond EOD, truncated [ 658.563491] loop4: p61 start 1854537728 is beyond EOD, truncated [ 658.576510] loop4: p62 start 1854537728 is beyond EOD, truncated [ 658.585607] loop4: p63 start 1854537728 is beyond EOD, truncated [ 658.595421] loop4: p64 start 1854537728 is beyond EOD, truncated [ 658.605569] loop4: p65 start 1854537728 is beyond EOD, truncated [ 658.616603] loop4: p66 start 1854537728 is beyond EOD, truncated [ 658.627200] loop4: p67 start 1854537728 is beyond EOD, truncated [ 658.637632] loop4: p68 start 1854537728 is beyond EOD, truncated [ 658.648355] loop4: p69 start 1854537728 is beyond EOD, truncated [ 658.659892] loop4: p70 start 1854537728 is beyond EOD, truncated [ 658.669458] loop4: p71 start 1854537728 is beyond EOD, truncated [ 658.679985] loop4: p72 start 1854537728 is beyond EOD, truncated [ 658.689910] loop4: p73 start 1854537728 is beyond EOD, truncated [ 658.698095] loop4: p74 start 1854537728 is beyond EOD, truncated [ 658.705022] loop4: p75 start 1854537728 is beyond EOD, truncated [ 658.711962] loop4: p76 start 1854537728 is beyond EOD, truncated [ 658.718645] loop4: p77 start 1854537728 is beyond EOD, truncated [ 658.725169] loop4: p78 start 1854537728 is beyond EOD, truncated [ 658.732046] loop4: p79 start 1854537728 is beyond EOD, truncated [ 658.738627] loop4: p80 start 1854537728 is beyond EOD, truncated [ 658.745284] loop4: p81 start 1854537728 is beyond EOD, truncated [ 658.751998] loop4: p82 start 1854537728 is beyond EOD, truncated [ 658.758434] loop4: p83 start 1854537728 is beyond EOD, truncated [ 658.764954] loop4: p84 start 1854537728 is beyond EOD, truncated [ 658.771381] loop4: p85 start 1854537728 is beyond EOD, truncated [ 658.777658] loop4: p86 start 1854537728 is beyond EOD, truncated [ 658.783973] loop4: p87 start 1854537728 is beyond EOD, truncated [ 658.790251] loop4: p88 start 1854537728 is beyond EOD, truncated [ 658.796913] loop4: p89 start 1854537728 is beyond EOD, truncated [ 658.803208] loop4: p90 start 1854537728 is beyond EOD, truncated [ 658.809471] loop4: p91 start 1854537728 is beyond EOD, truncated [ 658.815779] loop4: p92 start 1854537728 is beyond EOD, truncated [ 658.822077] loop4: p93 start 1854537728 is beyond EOD, truncated [ 658.828377] loop4: p94 start 1854537728 is beyond EOD, truncated [ 658.834893] loop4: p95 start 1854537728 is beyond EOD, truncated [ 658.841378] loop4: p96 start 1854537728 is beyond EOD, truncated [ 658.847810] loop4: p97 start 1854537728 is beyond EOD, truncated [ 658.854151] loop4: p98 start 1854537728 is beyond EOD, truncated [ 658.860619] loop4: p99 start 1854537728 is beyond EOD, truncated [ 658.866922] loop4: p100 start 1854537728 is beyond EOD, truncated [ 658.873350] loop4: p101 start 1854537728 is beyond EOD, truncated [ 658.879939] loop4: p102 start 1854537728 is beyond EOD, truncated [ 658.886363] loop4: p103 start 1854537728 is beyond EOD, truncated [ 658.892749] loop4: p104 start 1854537728 is beyond EOD, truncated [ 658.899258] loop4: p105 start 1854537728 is beyond EOD, truncated [ 658.905697] loop4: p106 start 1854537728 is beyond EOD, truncated [ 658.912100] loop4: p107 start 1854537728 is beyond EOD, truncated [ 658.918463] loop4: p108 start 1854537728 is beyond EOD, truncated [ 658.925003] loop4: p109 start 1854537728 is beyond EOD, truncated [ 658.931388] loop4: p110 start 1854537728 is beyond EOD, truncated [ 658.937886] loop4: p111 start 1854537728 is beyond EOD, truncated [ 658.944292] loop4: p112 start 1854537728 is beyond EOD, truncated [ 658.950692] loop4: p113 start 1854537728 is beyond EOD, truncated [ 658.957076] loop4: p114 start 1854537728 is beyond EOD, truncated [ 658.963512] loop4: p115 start 1854537728 is beyond EOD, truncated [ 658.969858] loop4: p116 start 1854537728 is beyond EOD, truncated [ 658.976256] loop4: p117 start 1854537728 is beyond EOD, truncated [ 658.982635] loop4: p118 start 1854537728 is beyond EOD, truncated [ 658.989017] loop4: p119 start 1854537728 is beyond EOD, truncated [ 658.995466] loop4: p120 start 1854537728 is beyond EOD, truncated [ 659.001837] loop4: p121 start 1854537728 is beyond EOD, truncated [ 659.008175] loop4: p122 start 1854537728 is beyond EOD, truncated [ 659.014571] loop4: p123 start 1854537728 is beyond EOD, truncated [ 659.020959] loop4: p124 start 1854537728 is beyond EOD, truncated [ 659.027312] loop4: p125 start 1854537728 is beyond EOD, truncated [ 659.033777] loop4: p126 start 1854537728 is beyond EOD, truncated [ 659.040145] loop4: p127 start 1854537728 is beyond EOD, truncated [ 659.046738] loop4: p128 start 1854537728 is beyond EOD, truncated [ 659.053308] loop4: p129 start 1854537728 is beyond EOD, truncated [ 659.059693] loop4: p130 start 1854537728 is beyond EOD, truncated [ 659.066114] loop4: p131 start 1854537728 is beyond EOD, truncated [ 659.072896] loop4: p132 start 1854537728 is beyond EOD, truncated [ 659.079242] loop4: p133 start 1854537728 is beyond EOD, truncated [ 659.085805] loop4: p134 start 1854537728 is beyond EOD, truncated [ 659.092198] loop4: p135 start 1854537728 is beyond EOD, truncated [ 659.098545] loop4: p136 start 1854537728 is beyond EOD, truncated [ 659.104928] loop4: p137 start 1854537728 is beyond EOD, truncated [ 659.111325] loop4: p138 start 1854537728 is beyond EOD, truncated [ 659.117689] loop4: p139 start 1854537728 is beyond EOD, truncated [ 659.124070] loop4: p140 start 1854537728 is beyond EOD, truncated [ 659.130556] loop4: p141 start 1854537728 is beyond EOD, truncated [ 659.136939] loop4: p142 start 1854537728 is beyond EOD, truncated [ 659.143347] loop4: p143 start 1854537728 is beyond EOD, truncated [ 659.149711] loop4: p144 start 1854537728 is beyond EOD, truncated [ 659.156147] loop4: p145 start 1854537728 is beyond EOD, truncated [ 659.163308] loop4: p146 start 1854537728 is beyond EOD, truncated [ 659.169693] loop4: p147 start 1854537728 is beyond EOD, truncated [ 659.176126] loop4: p148 start 1854537728 is beyond EOD, truncated [ 659.182501] loop4: p149 start 1854537728 is beyond EOD, truncated [ 659.189239] loop4: p150 start 1854537728 is beyond EOD, truncated [ 659.195676] loop4: p151 start 1854537728 is beyond EOD, truncated [ 659.202156] loop4: p152 start 1854537728 is beyond EOD, truncated [ 659.208696] loop4: p153 start 1854537728 is beyond EOD, truncated [ 659.215089] loop4: p154 start 1854537728 is beyond EOD, truncated [ 659.221469] loop4: p155 start 1854537728 is beyond EOD, truncated [ 659.227828] loop4: p156 start 1854537728 is beyond EOD, truncated [ 659.234252] loop4: p157 start 1854537728 is beyond EOD, truncated [ 659.240828] loop4: p158 start 1854537728 is beyond EOD, truncated [ 659.247188] loop4: p159 start 1854537728 is beyond EOD, truncated [ 659.253575] loop4: p160 start 1854537728 is beyond EOD, truncated [ 659.260111] loop4: p161 start 1854537728 is beyond EOD, truncated [ 659.266498] loop4: p162 start 1854537728 is beyond EOD, truncated [ 659.273085] loop4: p163 start 1854537728 is beyond EOD, truncated [ 659.279423] loop4: p164 start 1854537728 is beyond EOD, truncated [ 659.285800] loop4: p165 start 1854537728 is beyond EOD, truncated [ 659.292204] loop4: p166 start 1854537728 is beyond EOD, truncated [ 659.298569] loop4: p167 start 1854537728 is beyond EOD, truncated [ 659.304983] loop4: p168 start 1854537728 is beyond EOD, truncated [ 659.311602] loop4: p169 start 1854537728 is beyond EOD, truncated [ 659.317974] loop4: p170 start 1854537728 is beyond EOD, truncated [ 659.324374] loop4: p171 start 1854537728 is beyond EOD, truncated [ 659.330801] loop4: p172 start 1854537728 is beyond EOD, truncated [ 659.337162] loop4: p173 start 1854537728 is beyond EOD, truncated [ 659.343564] loop4: p174 start 1854537728 is beyond EOD, truncated [ 659.350032] loop4: p175 start 1854537728 is beyond EOD, truncated [ 659.356532] loop4: p176 start 1854537728 is beyond EOD, truncated [ 659.362938] loop4: p177 start 1854537728 is beyond EOD, truncated [ 659.369300] loop4: p178 start 1854537728 is beyond EOD, truncated [ 659.375689] loop4: p179 start 1854537728 is beyond EOD, truncated [ 659.382090] loop4: p180 start 1854537728 is beyond EOD, truncated [ 659.388997] loop4: p181 start 1854537728 is beyond EOD, truncated [ 659.395417] loop4: p182 start 1854537728 is beyond EOD, truncated [ 659.401885] loop4: p183 start 1854537728 is beyond EOD, truncated [ 659.408255] loop4: p184 start 1854537728 is beyond EOD, truncated [ 659.414692] loop4: p185 start 1854537728 is beyond EOD, truncated [ 659.421322] loop4: p186 start 1854537728 is beyond EOD, truncated [ 659.427673] loop4: p187 start 1854537728 is beyond EOD, truncated [ 659.434075] loop4: p188 start 1854537728 is beyond EOD, truncated [ 659.440437] loop4: p189 start 1854537728 is beyond EOD, truncated [ 659.446920] loop4: p190 start 1854537728 is beyond EOD, truncated [ 659.453320] loop4: p191 start 1854537728 is beyond EOD, truncated [ 659.459669] loop4: p192 start 1854537728 is beyond EOD, truncated [ 659.466054] loop4: p193 start 1854537728 is beyond EOD, truncated [ 659.472464] loop4: p194 start 1854537728 is beyond EOD, truncated [ 659.478817] loop4: p195 start 1854537728 is beyond EOD, truncated [ 659.485223] loop4: p196 start 1854537728 is beyond EOD, truncated [ 659.491643] loop4: p197 start 1854537728 is beyond EOD, truncated [ 659.497997] loop4: p198 start 1854537728 is beyond EOD, truncated [ 659.504700] loop4: p199 start 1854537728 is beyond EOD, truncated [ 659.511106] loop4: p200 start 1854537728 is beyond EOD, truncated [ 659.517453] loop4: p201 start 1854537728 is beyond EOD, truncated [ 659.523831] loop4: p202 start 1854537728 is beyond EOD, truncated [ 659.531024] loop4: p203 start 1854537728 is beyond EOD, truncated [ 659.537549] loop4: p204 start 1854537728 is beyond EOD, truncated [ 659.543996] loop4: p205 start 1854537728 is beyond EOD, truncated [ 659.550629] loop4: p206 start 1854537728 is beyond EOD, truncated [ 659.556991] loop4: p207 start 1854537728 is beyond EOD, truncated [ 659.563389] loop4: p208 start 1854537728 is beyond EOD, truncated [ 659.569845] loop4: p209 start 1854537728 is beyond EOD, truncated [ 659.576300] loop4: p210 start 1854537728 is beyond EOD, truncated [ 659.582674] loop4: p211 start 1854537728 is beyond EOD, truncated [ 659.589139] loop4: p212 start 1854537728 is beyond EOD, truncated [ 659.595549] loop4: p213 start 1854537728 is beyond EOD, truncated [ 659.601926] loop4: p214 start 1854537728 is beyond EOD, truncated [ 659.608354] loop4: p215 start 1854537728 is beyond EOD, truncated [ 659.614868] loop4: p216 start 1854537728 is beyond EOD, truncated [ 659.621269] loop4: p217 start 1854537728 is beyond EOD, truncated [ 659.627639] loop4: p218 start 1854537728 is beyond EOD, truncated [ 659.635041] loop4: p219 start 1854537728 is beyond EOD, truncated [ 659.641459] loop4: p220 start 1854537728 is beyond EOD, truncated [ 659.647991] loop4: p221 start 1854537728 is beyond EOD, truncated [ 659.654427] loop4: p222 start 1854537728 is beyond EOD, truncated [ 659.660960] loop4: p223 start 1854537728 is beyond EOD, truncated [ 659.667353] loop4: p224 start 1854537728 is beyond EOD, truncated [ 659.673788] loop4: p225 start 1854537728 is beyond EOD, truncated [ 659.680180] loop4: p226 start 1854537728 is beyond EOD, truncated [ 659.686595] loop4: p227 start 1854537728 is beyond EOD, truncated [ 659.693003] loop4: p228 start 1854537728 is beyond EOD, truncated [ 659.699362] loop4: p229 start 1854537728 is beyond EOD, truncated [ 659.705795] loop4: p230 start 1854537728 is beyond EOD, truncated [ 659.712211] loop4: p231 start 1854537728 is beyond EOD, truncated [ 659.718573] loop4: p232 start 1854537728 is beyond EOD, truncated [ 659.724989] loop4: p233 start 1854537728 is beyond EOD, truncated [ 659.731449] loop4: p234 start 1854537728 is beyond EOD, truncated [ 659.737818] loop4: p235 start 1854537728 is beyond EOD, truncated [ 659.744206] loop4: p236 start 1854537728 is beyond EOD, truncated [ 659.750719] loop4: p237 start 1854537728 is beyond EOD, truncated [ 659.757261] loop4: p238 start 1854537728 is beyond EOD, truncated [ 659.764100] loop4: p239 start 1854537728 is beyond EOD, truncated [ 659.770795] loop4: p240 start 1854537728 is beyond EOD, truncated [ 659.777318] loop4: p241 start 1854537728 is beyond EOD, truncated [ 659.783713] loop4: p242 start 1854537728 is beyond EOD, truncated [ 659.790205] loop4: p243 start 1854537728 is beyond EOD, truncated [ 659.796669] loop4: p244 start 1854537728 is beyond EOD, truncated [ 659.803950] loop4: p245 start 1854537728 is beyond EOD, truncated [ 659.810405] loop4: p246 start 1854537728 is beyond EOD, truncated [ 659.816840] loop4: p247 start 1854537728 is beyond EOD, truncated [ 659.823216] loop4: p248 start 1854537728 is beyond EOD, truncated [ 659.829796] loop4: p249 start 1854537728 is beyond EOD, truncated [ 659.836209] loop4: p250 start 1854537728 is beyond EOD, truncated [ 659.842764] loop4: p251 start 1854537728 is beyond EOD, truncated [ 659.849298] loop4: p252 start 1854537728 is beyond EOD, truncated [ 659.856165] loop4: p253 start 1854537728 is beyond EOD, truncated [ 659.862675] loop4: p254 start 1854537728 is beyond EOD, truncated [ 659.869027] loop4: p255 start 1854537728 is beyond EOD, truncated 23:55:13 executing program 4: creat(0x0, 0x198) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_route(0x10, 0x3, 0x0) dup(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x2007fff) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) keyctl$assume_authority(0x10, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x14) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000003000/0x2000)=nil) socket$packet(0x11, 0x3, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={0x0}}, 0x82) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) syz_genetlink_get_family_id$ipvs(0x0) getpid() ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f00000001c0)={0x2, 0x0, 0xfd}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) 23:55:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x00'/75, 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYBLOB="a9505bd65813817c2a3f13539857447fe09181da29e999ca7d56011f2ed8cebd808334b58f4e00d205a228daa1b6bd3d24f37689f19d8377a7843a95c658caee"], 0x48) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, &(0x7f0000000040), r1, 0x0, 0x100000200002, 0x0) 23:55:13 executing program 2: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x0, @random="edbd76f3c724"}, 0x0, {0x2, 0x0, @dev}, 'bridge_slave_0\x00'}) 23:55:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100080c10000000000005000000", 0x58}], 0x1) 23:55:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x7}}) 23:55:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:55:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009081000418e00000004fcff", 0xfed1}], 0x1) 23:55:13 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) 23:55:13 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2, 0x3, 0x100000001) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto(r2, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 660.473526] audit: type=1400 audit(1575244513.960:379): avc: denied { create } for pid=26188 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 23:55:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009081000418e00000004fcff", 0xfed1}], 0x1) [ 660.794646] loop4: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p 23:55:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) pipe(&(0x7f00000004c0)) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 661.701871] loop4: p1 size 2 extends beyond EOD, truncated [ 661.720031] loop4: p4 start 1854537728 is beyond EOD, truncated [ 661.766141] loop4: p5 start 1854537728 is beyond EOD, truncated [ 661.803228] loop4: p6 start 1854537728 is beyond EOD, truncated [ 661.817700] loop4: p7 start 1854537728 is beyond EOD, truncated [ 661.842104] loop4: p8 start 1854537728 is beyond EOD, truncated [ 661.867708] loop4: p9 start 1854537728 is beyond EOD, truncated [ 661.883541] loop4: p10 start 1854537728 is beyond EOD, truncated [ 661.893536] loop4: p11 start 1854537728 is beyond EOD, truncated [ 661.904950] loop4: p12 start 1854537728 is beyond EOD, truncated [ 661.918037] loop4: p13 start 1854537728 is beyond EOD, truncated [ 661.925733] loop4: p14 start 1854537728 is beyond EOD, truncated [ 661.933332] loop4: p15 start 1854537728 is beyond EOD, truncated [ 661.939644] loop4: p16 start 1854537728 is beyond EOD, truncated [ 661.947258] loop4: p17 start 1854537728 is beyond EOD, truncated [ 661.955316] loop4: p18 start 1854537728 is beyond EOD, truncated [ 662.062932] loop4: p19 start 1854537728 is beyond EOD, truncated [ 662.070845] loop4: p20 start 1854537728 is beyond EOD, truncated [ 662.077121] loop4: p21 start 1854537728 is beyond EOD, truncated [ 662.083566] loop4: p22 start 1854537728 is beyond EOD, truncated [ 662.089845] loop4: p23 start 1854537728 is beyond EOD, truncated [ 662.098559] loop4: p24 start 1854537728 is beyond EOD, truncated [ 662.105401] loop4: p25 start 1854537728 is beyond EOD, truncated [ 662.113090] loop4: p26 start 1854537728 is beyond EOD, truncated [ 662.119379] loop4: p27 start 1854537728 is beyond EOD, truncated [ 662.125855] loop4: p28 start 1854537728 is beyond EOD, truncated [ 662.133205] loop4: p29 start 1854537728 is beyond EOD, truncated [ 662.139484] loop4: p30 start 1854537728 is beyond EOD, truncated [ 662.146014] loop4: p31 start 1854537728 is beyond EOD, truncated [ 662.152566] loop4: p32 start 1854537728 is beyond EOD, truncated [ 662.159065] loop4: p33 start 1854537728 is beyond EOD, truncated [ 662.165427] loop4: p34 start 1854537728 is beyond EOD, truncated [ 662.171747] loop4: p35 start 1854537728 is beyond EOD, truncated [ 662.178074] loop4: p36 start 1854537728 is beyond EOD, truncated [ 662.184513] loop4: p37 start 1854537728 is beyond EOD, truncated [ 662.191019] loop4: p38 start 1854537728 is beyond EOD, truncated [ 662.197308] loop4: p39 start 1854537728 is beyond EOD, truncated [ 662.203771] loop4: p40 start 1854537728 is beyond EOD, truncated [ 662.210106] loop4: p41 start 1854537728 is beyond EOD, truncated [ 662.216723] loop4: p42 start 1854537728 is beyond EOD, truncated [ 662.223014] loop4: p43 start 1854537728 is beyond EOD, truncated [ 662.229280] loop4: p44 start 1854537728 is beyond EOD, truncated [ 662.235620] loop4: p45 start 1854537728 is beyond EOD, truncated [ 662.241959] loop4: p46 start 1854537728 is beyond EOD, truncated [ 662.248234] loop4: p47 start 1854537728 is beyond EOD, truncated [ 662.254618] loop4: p48 start 1854537728 is beyond EOD, truncated [ 662.260999] loop4: p49 start 1854537728 is beyond EOD, truncated [ 662.267275] loop4: p50 start 1854537728 is beyond EOD, truncated [ 662.273578] loop4: p51 start 1854537728 is beyond EOD, truncated [ 662.279853] loop4: p52 start 1854537728 is beyond EOD, truncated [ 662.286174] loop4: p53 start 1854537728 is beyond EOD, truncated [ 662.292626] loop4: p54 start 1854537728 is beyond EOD, truncated [ 662.298903] loop4: p55 start 1854537728 is beyond EOD, truncated [ 662.305203] loop4: p56 start 1854537728 is beyond EOD, truncated [ 662.311581] loop4: p57 start 1854537728 is beyond EOD, truncated [ 662.318119] loop4: p58 start 1854537728 is beyond EOD, truncated [ 662.324442] loop4: p59 start 1854537728 is beyond EOD, truncated [ 662.330870] loop4: p60 start 1854537728 is beyond EOD, truncated [ 662.337163] loop4: p61 start 1854537728 is beyond EOD, truncated [ 662.343482] loop4: p62 start 1854537728 is beyond EOD, truncated [ 662.349956] loop4: p63 start 1854537728 is beyond EOD, truncated [ 662.356295] loop4: p64 start 1854537728 is beyond EOD, truncated [ 662.362590] loop4: p65 start 1854537728 is beyond EOD, truncated [ 662.368852] loop4: p66 start 1854537728 is beyond EOD, truncated [ 662.375150] loop4: p67 start 1854537728 is beyond EOD, truncated [ 662.381456] loop4: p68 start 1854537728 is beyond EOD, truncated [ 662.387704] loop4: p69 start 1854537728 is beyond EOD, truncated [ 662.393999] loop4: p70 start 1854537728 is beyond EOD, truncated [ 662.400684] loop4: p71 start 1854537728 is beyond EOD, truncated [ 662.406935] loop4: p72 start 1854537728 is beyond EOD, truncated [ 662.413280] loop4: p73 start 1854537728 is beyond EOD, truncated [ 662.419605] loop4: p74 start 1854537728 is beyond EOD, truncated [ 662.425941] loop4: p75 start 1854537728 is beyond EOD, truncated [ 662.432358] loop4: p76 start 1854537728 is beyond EOD, truncated [ 662.438794] loop4: p77 start 1854537728 is beyond EOD, truncated [ 662.445081] loop4: p78 start 1854537728 is beyond EOD, truncated [ 662.451375] loop4: p79 start 1854537728 is beyond EOD, truncated [ 662.457654] loop4: p80 start 1854537728 is beyond EOD, truncated [ 662.464155] loop4: p81 start 1854537728 is beyond EOD, truncated [ 662.470412] loop4: p82 start 1854537728 is beyond EOD, truncated [ 662.476831] loop4: p83 start 1854537728 is beyond EOD, truncated [ 662.483144] loop4: p84 start 1854537728 is beyond EOD, truncated [ 662.489411] loop4: p85 start 1854537728 is beyond EOD, truncated [ 662.495744] loop4: p86 start 1854537728 is beyond EOD, truncated [ 662.502050] loop4: p87 start 1854537728 is beyond EOD, truncated [ 662.508457] loop4: p88 start 1854537728 is beyond EOD, truncated [ 662.514906] loop4: p89 start 1854537728 is beyond EOD, truncated [ 662.521215] loop4: p90 start 1854537728 is beyond EOD, truncated [ 662.527486] loop4: p91 start 1854537728 is beyond EOD, truncated [ 662.533815] loop4: p92 start 1854537728 is beyond EOD, truncated [ 662.541095] loop4: p93 start 1854537728 is beyond EOD, truncated [ 662.547398] loop4: p94 start 1854537728 is beyond EOD, truncated [ 662.553985] loop4: p95 start 1854537728 is beyond EOD, truncated [ 662.560371] loop4: p96 start 1854537728 is beyond EOD, truncated [ 662.566673] loop4: p97 start 1854537728 is beyond EOD, truncated [ 662.572979] loop4: p98 start 1854537728 is beyond EOD, truncated [ 662.579259] loop4: p99 start 1854537728 is beyond EOD, truncated [ 662.585574] loop4: p100 start 1854537728 is beyond EOD, truncated [ 662.591979] loop4: p101 start 1854537728 is beyond EOD, truncated [ 662.598333] loop4: p102 start 1854537728 is beyond EOD, truncated [ 662.605693] loop4: p103 start 1854537728 is beyond EOD, truncated [ 662.612114] loop4: p104 start 1854537728 is beyond EOD, truncated [ 662.618498] loop4: p105 start 1854537728 is beyond EOD, truncated [ 662.624923] loop4: p106 start 1854537728 is beyond EOD, truncated [ 662.631359] loop4: p107 start 1854537728 is beyond EOD, truncated [ 662.637857] loop4: p108 start 1854537728 is beyond EOD, truncated [ 662.644272] loop4: p109 start 1854537728 is beyond EOD, truncated [ 662.650692] loop4: p110 start 1854537728 is beyond EOD, truncated [ 662.657089] loop4: p111 start 1854537728 is beyond EOD, truncated [ 662.663521] loop4: p112 start 1854537728 is beyond EOD, truncated [ 662.669914] loop4: p113 start 1854537728 is beyond EOD, truncated [ 662.676335] loop4: p114 start 1854537728 is beyond EOD, truncated [ 662.683277] loop4: p115 start 1854537728 is beyond EOD, truncated [ 662.689652] loop4: p116 start 1854537728 is beyond EOD, truncated [ 662.696059] loop4: p117 start 1854537728 is beyond EOD, truncated [ 662.703064] loop4: p118 start 1854537728 is beyond EOD, truncated [ 662.709460] loop4: p119 start 1854537728 is beyond EOD, truncated [ 662.716034] loop4: p120 start 1854537728 is beyond EOD, truncated [ 662.722504] loop4: p121 start 1854537728 is beyond EOD, truncated [ 662.728888] loop4: p122 start 1854537728 is beyond EOD, truncated [ 662.735584] loop4: p123 start 1854537728 is beyond EOD, truncated [ 662.741983] loop4: p124 start 1854537728 is beyond EOD, truncated [ 662.748369] loop4: p125 start 1854537728 is beyond EOD, truncated [ 662.754800] loop4: p126 start 1854537728 is beyond EOD, truncated [ 662.761227] loop4: p127 start 1854537728 is beyond EOD, truncated [ 662.767608] loop4: p128 start 1854537728 is beyond EOD, truncated [ 662.774024] loop4: p129 start 1854537728 is beyond EOD, truncated [ 662.780469] loop4: p130 start 1854537728 is beyond EOD, truncated [ 662.786866] loop4: p131 start 1854537728 is beyond EOD, truncated [ 662.793318] loop4: p132 start 1854537728 is beyond EOD, truncated [ 662.799700] loop4: p133 start 1854537728 is beyond EOD, truncated [ 662.806115] loop4: p134 start 1854537728 is beyond EOD, truncated [ 662.812519] loop4: p135 start 1854537728 is beyond EOD, truncated [ 662.818867] loop4: p136 start 1854537728 is beyond EOD, truncated [ 662.825245] loop4: p137 start 1854537728 is beyond EOD, truncated [ 662.831661] loop4: p138 start 1854537728 is beyond EOD, truncated [ 662.838066] loop4: p139 start 1854537728 is beyond EOD, truncated [ 662.844496] loop4: p140 start 1854537728 is beyond EOD, truncated [ 662.850947] loop4: p141 start 1854537728 is beyond EOD, truncated [ 662.857618] loop4: p142 start 1854537728 is beyond EOD, truncated [ 662.864034] loop4: p143 start 1854537728 is beyond EOD, truncated [ 662.870553] loop4: p144 start 1854537728 is beyond EOD, truncated [ 662.876937] loop4: p145 start 1854537728 is beyond EOD, truncated [ 662.883344] loop4: p146 start 1854537728 is beyond EOD, truncated [ 662.890334] loop4: p147 start 1854537728 is beyond EOD, truncated [ 662.896757] loop4: p148 start 1854537728 is beyond EOD, truncated [ 662.903152] loop4: p149 start 1854537728 is beyond EOD, truncated [ 662.909543] loop4: p150 start 1854537728 is beyond EOD, truncated [ 662.915970] loop4: p151 start 1854537728 is beyond EOD, truncated [ 662.922407] loop4: p152 start 1854537728 is beyond EOD, truncated [ 662.928793] loop4: p153 start 1854537728 is beyond EOD, truncated [ 662.935382] loop4: p154 start 1854537728 is beyond EOD, truncated [ 662.941807] loop4: p155 start 1854537728 is beyond EOD, truncated [ 662.948177] loop4: p156 start 1854537728 is beyond EOD, truncated [ 662.954579] loop4: p157 start 1854537728 is beyond EOD, truncated [ 662.960992] loop4: p158 start 1854537728 is beyond EOD, truncated [ 662.967454] loop4: p159 start 1854537728 is beyond EOD, truncated [ 662.973858] loop4: p160 start 1854537728 is beyond EOD, truncated [ 662.980225] loop4: p161 start 1854537728 is beyond EOD, truncated [ 662.986669] loop4: p162 start 1854537728 is beyond EOD, truncated [ 662.993082] loop4: p163 start 1854537728 is beyond EOD, truncated [ 662.999490] loop4: p164 start 1854537728 is beyond EOD, truncated [ 663.005892] loop4: p165 start 1854537728 is beyond EOD, truncated [ 663.012280] loop4: p166 start 1854537728 is beyond EOD, truncated [ 663.018628] loop4: p167 start 1854537728 is beyond EOD, truncated [ 663.025011] loop4: p168 start 1854537728 is beyond EOD, truncated [ 663.031386] loop4: p169 start 1854537728 is beyond EOD, truncated [ 663.037750] loop4: p170 start 1854537728 is beyond EOD, truncated [ 663.044145] loop4: p171 start 1854537728 is beyond EOD, truncated [ 663.050535] loop4: p172 start 1854537728 is beyond EOD, truncated [ 663.056933] loop4: p173 start 1854537728 is beyond EOD, truncated [ 663.063348] loop4: p174 start 1854537728 is beyond EOD, truncated [ 663.069715] loop4: p175 start 1854537728 is beyond EOD, truncated [ 663.076281] loop4: p176 start 1854537728 is beyond EOD, truncated [ 663.082668] loop4: p177 start 1854537728 is beyond EOD, truncated [ 663.089025] loop4: p178 start 1854537728 is beyond EOD, truncated [ 663.095428] loop4: p179 start 1854537728 is beyond EOD, truncated [ 663.101855] loop4: p180 start 1854537728 is beyond EOD, truncated [ 663.108207] loop4: p181 start 1854537728 is beyond EOD, truncated [ 663.114775] loop4: p182 start 1854537728 is beyond EOD, truncated [ 663.121191] loop4: p183 start 1854537728 is beyond EOD, truncated [ 663.127697] loop4: p184 start 1854537728 is beyond EOD, truncated [ 663.134101] loop4: p185 start 1854537728 is beyond EOD, truncated [ 663.140442] loop4: p186 start 1854537728 is beyond EOD, truncated [ 663.146833] loop4: p187 start 1854537728 is beyond EOD, truncated [ 663.153340] loop4: p188 start 1854537728 is beyond EOD, truncated [ 663.161222] loop4: p189 start 1854537728 is beyond EOD, truncated [ 663.167595] loop4: p190 start 1854537728 is beyond EOD, truncated [ 663.173993] loop4: p191 start 1854537728 is beyond EOD, truncated [ 663.180356] loop4: p192 start 1854537728 is beyond EOD, truncated [ 663.186795] loop4: p193 start 1854537728 is beyond EOD, truncated [ 663.193204] loop4: p194 start 1854537728 is beyond EOD, truncated [ 663.199605] loop4: p195 start 1854537728 is beyond EOD, truncated [ 663.205972] loop4: p196 start 1854537728 is beyond EOD, truncated [ 663.212397] loop4: p197 start 1854537728 is beyond EOD, truncated [ 663.218746] loop4: p198 start 1854537728 is beyond EOD, truncated [ 663.225137] loop4: p199 start 1854537728 is beyond EOD, truncated [ 663.231544] loop4: p200 start 1854537728 is beyond EOD, truncated [ 663.237908] loop4: p201 start 1854537728 is beyond EOD, truncated [ 663.244308] loop4: p202 start 1854537728 is beyond EOD, truncated [ 663.250802] loop4: p203 start 1854537728 is beyond EOD, truncated [ 663.257266] loop4: p204 start 1854537728 is beyond EOD, truncated [ 663.263673] loop4: p205 start 1854537728 is beyond EOD, truncated [ 663.270037] loop4: p206 start 1854537728 is beyond EOD, truncated [ 663.276473] loop4: p207 start 1854537728 is beyond EOD, truncated [ 663.282867] loop4: p208 start 1854537728 is beyond EOD, truncated [ 663.289217] loop4: p209 start 1854537728 is beyond EOD, truncated [ 663.295614] loop4: p210 start 1854537728 is beyond EOD, truncated [ 663.302004] loop4: p211 start 1854537728 is beyond EOD, truncated [ 663.308363] loop4: p212 start 1854537728 is beyond EOD, truncated [ 663.314767] loop4: p213 start 1854537728 is beyond EOD, truncated [ 663.321311] loop4: p214 start 1854537728 is beyond EOD, truncated [ 663.327709] loop4: p215 start 1854537728 is beyond EOD, truncated [ 663.334152] loop4: p216 start 1854537728 is beyond EOD, truncated [ 663.341668] loop4: p217 start 1854537728 is beyond EOD, truncated [ 663.348014] loop4: p218 start 1854537728 is beyond EOD, truncated [ 663.354455] loop4: p219 start 1854537728 is beyond EOD, truncated [ 663.360936] loop4: p220 start 1854537728 is beyond EOD, truncated [ 663.367443] loop4: p221 start 1854537728 is beyond EOD, truncated [ 663.373858] loop4: p222 start 1854537728 is beyond EOD, truncated [ 663.380377] loop4: p223 start 1854537728 is beyond EOD, truncated [ 663.386758] loop4: p224 start 1854537728 is beyond EOD, truncated [ 663.393151] loop4: p225 start 1854537728 is beyond EOD, truncated [ 663.399572] loop4: p226 start 1854537728 is beyond EOD, truncated [ 663.405954] loop4: p227 start 1854537728 is beyond EOD, truncated [ 663.412354] loop4: p228 start 1854537728 is beyond EOD, truncated [ 663.418706] loop4: p229 start 1854537728 is beyond EOD, truncated [ 663.425135] loop4: p230 start 1854537728 is beyond EOD, truncated [ 663.431530] loop4: p231 start 1854537728 is beyond EOD, truncated [ 663.437899] loop4: p232 start 1854537728 is beyond EOD, truncated [ 663.444294] loop4: p233 start 1854537728 is beyond EOD, truncated [ 663.450690] loop4: p234 start 1854537728 is beyond EOD, truncated [ 663.457065] loop4: p235 start 1854537728 is beyond EOD, truncated [ 663.463462] loop4: p236 start 1854537728 is beyond EOD, truncated [ 663.469843] loop4: p237 start 1854537728 is beyond EOD, truncated [ 663.476243] loop4: p238 start 1854537728 is beyond EOD, truncated [ 663.482662] loop4: p239 start 1854537728 is beyond EOD, truncated [ 663.489047] loop4: p240 start 1854537728 is beyond EOD, truncated [ 663.495494] loop4: p241 start 1854537728 is beyond EOD, truncated [ 663.501922] loop4: p242 start 1854537728 is beyond EOD, truncated [ 663.508294] loop4: p243 start 1854537728 is beyond EOD, truncated [ 663.514688] loop4: p244 start 1854537728 is beyond EOD, truncated [ 663.521066] loop4: p245 start 1854537728 is beyond EOD, truncated [ 663.527425] loop4: p246 start 1854537728 is beyond EOD, truncated [ 663.533863] loop4: p247 start 1854537728 is beyond EOD, truncated [ 663.540212] loop4: p248 start 1854537728 is beyond EOD, truncated [ 663.546944] loop4: p249 start 1854537728 is beyond EOD, truncated [ 663.553450] loop4: p250 start 1854537728 is beyond EOD, truncated [ 663.559897] loop4: p251 start 1854537728 is beyond EOD, truncated [ 663.566303] loop4: p252 start 1854537728 is beyond EOD, truncated [ 663.572716] loop4: p253 start 1854537728 is beyond EOD, truncated [ 663.579061] loop4: p254 start 1854537728 is beyond EOD, truncated [ 663.585463] loop4: p255 start 1854537728 is beyond EOD, truncated 23:55:17 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:17 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fdatasync(0xffffffffffffffff) open(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:55:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:55:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009081000418e00000004fcff", 0xfed1}], 0x1) 23:55:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 23:55:17 executing program 4: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000800)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) 23:55:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 23:55:17 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000600)="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", 0x200, 0x1200) 23:55:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009081000418e00000004fcff", 0xfed1}], 0x1) 23:55:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 23:55:18 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000600)="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", 0x200, 0x1200) 23:55:28 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000100)) 23:55:28 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) pause() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:55:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000600)="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", 0x200, 0x1200) 23:55:28 executing program 3: getrusage(0x1, &(0x7f0000000200)) 23:55:28 executing program 4: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:28 executing program 3: getrusage(0x1, &(0x7f0000000200)) 23:55:28 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000000)='ramfs\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000107, 0x12, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, &(0x7f0000000b80)) 23:55:28 executing program 0: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x8000003}) pwrite64(r1, &(0x7f0000000600)="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", 0x200, 0x1200) 23:55:29 executing program 3: getrusage(0x1, &(0x7f0000000200)) 23:55:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000000)='ramfs\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000107, 0x12, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, &(0x7f0000000b80)) 23:55:29 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) pause() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:55:29 executing program 3: getrusage(0x1, &(0x7f0000000200)) 23:55:29 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="dbd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x0, 0x136}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:55:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000000)='ramfs\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000107, 0x12, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, &(0x7f0000000b80)) 23:55:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@getlink={0x30, 0x12, 0x911, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) 23:55:44 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) io_setup(0x2, &(0x7f00000004c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 23:55:44 executing program 4: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) pipe(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) unshare(0x40000000) epoll_create(0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMBIS(r4, 0x5416, &(0x7f0000000080)=0x24c1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:55:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x2e, 0x0, 0x2aa, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r3 = openat$cgroup_ro(r2, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) preadv(r3, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 23:55:44 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) pause() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:55:44 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="dbd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x0, 0x136}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:55:44 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000000)='ramfs\x00', 0x0) write$P9_RREADDIR(r0, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000107, 0x12, r0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, &(0x7f0000000b80)) 23:55:44 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) io_setup(0x2, &(0x7f00000004c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 23:55:45 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 23:55:45 executing program 4: r0 = inotify_init() r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000082) write$binfmt_script(r1, &(0x7f00000000c0)={'#! ', './file0', [{}]}, 0xc) sendfile(r1, r1, &(0x7f0000000200), 0xa198) 23:55:45 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) io_setup(0x2, &(0x7f00000004c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 23:55:45 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 23:55:45 executing program 1: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) pause() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:55:46 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) io_setup(0x2, &(0x7f00000004c0)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) 23:55:46 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 23:56:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x2e, 0x0, 0x2aa, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r3 = openat$cgroup_ro(r2, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) preadv(r3, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 23:56:03 executing program 5: personality(0x1bb2baf3005ac137) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 23:56:03 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x8, &(0x7f0000001100)) 23:56:03 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x10a, &(0x7f00000011c0)}}], 0x4000000000000ce, 0x0) 23:56:03 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="dbd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x0, 0x136}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:03 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x8, &(0x7f0000001100)) 23:56:03 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/enforce\x00', 0x1, 0x0) write$P9_RATTACH(r0, 0x0, 0x5c) 23:56:03 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 23:56:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x2e, 0x0, 0x2aa, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r3 = openat$cgroup_ro(r2, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) preadv(r3, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 23:56:03 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x8, &(0x7f0000001100)) 23:56:04 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) r2 = getpgrp(0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f00000002c0)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) splice(r0, 0x0, r1, 0x0, 0x203, 0x0) 23:56:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x2e, 0x0, 0x2aa, &(0x7f0000000100)=ANY=[]}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00H') r3 = openat$cgroup_ro(r2, &(0x7f0000001fc0)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xaa\x92\xc7cw\xd6\xaf\xbe\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcf\x00\x00\x00\x00\x1aO\xb4\xf0_\xbd>\xf3\x1b\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba\xa9\x0e$\x16\xbcw\xff&DRYp\xb8\xdb\x00\x00\x00\x00\x00\x00\x00\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbcs\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x00\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/\x94 J\xc8x\xb6#a\xa5[\xbe\x0f\xe1\xf1=\xdd\xfb\xcb\xb0\xe5\xfd\x10wxF\x93\x03cK\r\xb6%\xa6\x0e\xfa\xcd\x18\xe0\x1e\xae\xc5\xa2\xe1*)\xb7]\x99\x83\xe8\xc3\xc1\xb9\x1d0\x9c\x98\xadRm', 0x0, 0x0) preadv(r3, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 23:56:04 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x8, &(0x7f0000001100)) 23:56:04 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xc, 0x4000000000000800, 0x1}, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f00000021c0), &(0x7f00000011c0)=""/4096}, 0x20) 23:56:04 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/enforce\x00', 0x1, 0x0) write$P9_RATTACH(r0, 0x0, 0x5c) [ 711.201432] audit: type=1400 audit(1575244564.690:380): avc: denied { map_create } for pid=27558 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:56:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000002400cf0d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100688e62001c0002001800020000000000aef1b90181b241fe86780829846118cdeb48d7e4fb6aa978bd"], 0x48}}, 0x0) [ 711.375621] audit: type=1400 audit(1575244564.860:381): avc: denied { map_create } for pid=27558 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 23:56:06 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="dbd2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x0, 0x136}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:06 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) 23:56:06 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/enforce\x00', 0x1, 0x0) write$P9_RATTACH(r0, 0x0, 0x5c) 23:56:06 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vd\x96\x00'}, {0x4}}}]}, 0x30}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b7542ea6c3c37c4ebddc0e1f658765e4dce904fcb1cbaa5e0f946a89856208a8019f2a1b814f82d7baaac880e70040bbdc8c7b899f9aabf63655d2ef56c542588c3357943"], 0x0, 0xbb}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0xee283397efbf6c11}) 23:56:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0xee283397efbf6c11}) 23:56:07 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) r2 = getpgrp(0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f00000002c0)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) splice(r0, 0x0, r1, 0x0, 0x203, 0x0) 23:56:07 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/enforce\x00', 0x1, 0x0) write$P9_RATTACH(r0, 0x0, 0x5c) 23:56:07 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setuid(r1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:56:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0xee283397efbf6c11}) 23:56:07 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) 23:56:07 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) pipe(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:56:07 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) 23:56:07 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setuid(r1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:56:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags=0xee283397efbf6c11}) 23:56:09 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vd\x96\x00'}, {0x4}}}]}, 0x30}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b7542ea6c3c37c4ebddc0e1f658765e4dce904fcb1cbaa5e0f946a89856208a8019f2a1b814f82d7baaac880e70040bbdc8c7b899f9aabf63655d2ef56c542588c3357943"], 0x0, 0xbb}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) 23:56:09 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) r2 = getpgrp(0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f00000002c0)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) splice(r0, 0x0, r1, 0x0, 0x203, 0x0) 23:56:09 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setuid(r1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:56:09 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000400)='./bus\x00', &(0x7f0000000040)='security.capability\x00', 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v3, 0x18, 0x0) 23:56:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000300)={0x6, 'gretap0\x00', {0x9}, 0x3}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20440, 0x0) 23:56:09 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) r2 = getpgrp(0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x7, &(0x7f00000002c0)) signalfd4(0xffffffffffffffff, &(0x7f0000a71ff8)={0x5f}, 0x8, 0x0) splice(r0, 0x0, r1, 0x0, 0x203, 0x0) 23:56:09 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x3) 23:56:09 executing program 2: r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setuid(r1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 23:56:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) 23:56:09 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="79f3ff0000000500000000000000e73b0959237618c9"], 0x16) sendfile(r0, r0, &(0x7f0000001000), 0x2000000000006) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 23:56:09 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x3) 23:56:12 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vd\x96\x00'}, {0x4}}}]}, 0x30}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b7542ea6c3c37c4ebddc0e1f658765e4dce904fcb1cbaa5e0f946a89856208a8019f2a1b814f82d7baaac880e70040bbdc8c7b899f9aabf63655d2ef56c542588c3357943"], 0x0, 0xbb}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:12 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef476284"], 0x0, 0x58}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:12 executing program 2: r0 = socket(0x2, 0x803, 0xff) r1 = socket(0x10, 0x200000000080003, 0x0) dup2(r1, r0) 23:56:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) 23:56:12 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x3) 23:56:12 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="79f3ff0000000500000000000000e73b0959237618c9"], 0x16) sendfile(r0, r0, &(0x7f0000001000), 0x2000000000006) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 23:56:12 executing program 0: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x3) 23:56:12 executing program 3: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) 23:56:12 executing program 2: r0 = socket(0x2, 0x803, 0xff) r1 = socket(0x10, 0x200000000080003, 0x0) dup2(r1, r0) 23:56:13 executing program 0: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="13cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0x2b4}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYBLOB="12ec93bafeffffffffffffff7ba0294ccf3e5f5e6576eca7b8", @ANYPTR64, @ANYPTR], 0x0, 0x3b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:13 executing program 2: r0 = socket(0x2, 0x803, 0xff) r1 = socket(0x10, 0x200000000080003, 0x0) dup2(r1, r0) 23:56:13 executing program 3: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7573726a71756f74613dd2"]) [ 720.167702] EXT4-fs (loop3): journaled quota format not specified [ 720.229768] EXT4-fs (loop3): journaled quota format not specified 23:56:15 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vd\x96\x00'}, {0x4}}}]}, 0x30}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d59e49ecefedf29f150f48fa7ec5cab66b559969cd332a5eeff075656d6b7d21bf145e62166c6b31cfef16b080776ad79c7e8683ac61d859a63668db03b6806e1b26df4787c75fc0388de8c24377fd0d27caaedc7fe84aa5720e631ec2d22f2e89e6ca403bc571aa6039de4795e200f35134cf25758a8b7542ea6c3c37c4ebddc0e1f658765e4dce904fcb1cbaa5e0f946a89856208a8019f2a1b814f82d7baaac880e70040bbdc8c7b899f9aabf63655d2ef56c542588c3357943"], 0x0, 0xbb}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:15 executing program 2: r0 = socket(0x2, 0x803, 0xff) r1 = socket(0x10, 0x200000000080003, 0x0) dup2(r1, r0) 23:56:15 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="79f3ff0000000500000000000000e73b0959237618c9"], 0x16) sendfile(r0, r0, &(0x7f0000001000), 0x2000000000006) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 23:56:15 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:15 executing program 3: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7573726a71756f74613dd2"]) 23:56:15 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef476284"], 0x0, 0x58}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz1\x00', {}, 0x52}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000000180)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) [ 722.381233] audit: type=1400 audit(1575244575.870:382): avc: denied { wake_alarm } for pid=27717 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:15 executing program 3: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7573726a71756f74613dd2"]) [ 722.390834] EXT4-fs (loop3): journaled quota format not specified [ 722.557761] audit: type=1400 audit(1575244576.040:383): avc: denied { wake_alarm } for pid=27717 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:16 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 722.913704] input: syz1 as /devices/virtual/input/input30 23:56:16 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="79f3ff0000000500000000000000e73b0959237618c9"], 0x16) sendfile(r0, r0, &(0x7f0000001000), 0x2000000000006) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) futex(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) [ 723.097845] input: syz1 as /devices/virtual/input/input31 23:56:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz1\x00', {}, 0x52}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000000180)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) [ 723.193031] EXT4-fs (loop3): journaled quota format not specified 23:56:16 executing program 3: syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="25bca274769e620aa734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a73162700f6d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7573726a71756f74613dd2"]) [ 723.454833] audit: type=1400 audit(1575244576.940:384): avc: denied { wake_alarm } for pid=27742 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 723.973411] EXT4-fs (loop3): journaled quota format not specified [ 724.002870] input: syz1 as /devices/virtual/input/input32 23:56:18 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef476284"], 0x0, 0x58}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:18 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:56:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz1\x00', {}, 0x52}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000000180)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) 23:56:18 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:18 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:18 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 725.595293] audit: type=1400 audit(1575244579.080:385): avc: denied { wake_alarm } for pid=27768 comm="syz-executor.5" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000780)={'syz1\x00', {}, 0x52}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/166, 0x2e6}], 0x1) timer_create(0x0, &(0x7f0000000180)={0x0, 0x1000000000000012}, &(0x7f00000002c0)) r3 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r1, r0) tkill(r3, 0x15) 23:56:19 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 725.678078] audit: type=1400 audit(1575244579.160:386): avc: denied { wake_alarm } for pid=27770 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:19 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="202d91384ef42437947a35e67248b24915cd9912118a24cfc5907221e018add3a73148601b2e1a9506d1a45b710a75007724071870111608bb69a99faf699d5bf3376fdc5bc0f5b8b940e8daa19cffe8d22b84e99ddb68cf7ad5462070b72abcf5865128ee0148a5fc3e251acdfc96bd6b13de7076f1b8e83fc7218dce2f03cb65a3b2162c289225c010a63b34ac47a9738b2144adcc7925d3a77d48588a7020512d621b458d71648895fb04ca44dffc21454d45b2ff1e36bdd1177022a892564ca9fedf2f30c0d7f8960d164e64bd2e5a26109f5821488e1c44430625cffaf74fbc23cabb05de2c92dc6a5a3d824ce84213ea8e62b09177f1b5c3a6e7a53d54") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 725.704918] audit: type=1400 audit(1575244579.190:387): avc: denied { wake_alarm } for pid=27772 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:19 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="202d91384ef42437947a35e67248b24915cd9912118a24cfc5907221e018add3a73148601b2e1a9506d1a45b710a75007724071870111608bb69a99faf699d5bf3376fdc5bc0f5b8b940e8daa19cffe8d22b84e99ddb68cf7ad5462070b72abcf5865128ee0148a5fc3e251acdfc96bd6b13de7076f1b8e83fc7218dce2f03cb65a3b2162c289225c010a63b34ac47a9738b2144adcc7925d3a77d48588a7020512d621b458d71648895fb04ca44dffc21454d45b2ff1e36bdd1177022a892564ca9fedf2f30c0d7f8960d164e64bd2e5a26109f5821488e1c44430625cffaf74fbc23cabb05de2c92dc6a5a3d824ce84213ea8e62b09177f1b5c3a6e7a53d54") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:19 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 726.312150] input: syz1 as /devices/virtual/input/input34 [ 726.542015] audit: type=1400 audit(1575244580.030:388): avc: denied { wake_alarm } for pid=27792 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) [ 726.581982] audit: type=1400 audit(1575244580.070:389): avc: denied { wake_alarm } for pid=27791 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 726.661302] audit: type=1400 audit(1575244580.150:390): avc: denied { wake_alarm } for pid=27796 comm="syz-executor.5" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:21 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYPTR64, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef476284"], 0x0, 0x58}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:21 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/igmp6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x4800000000000000) poll(0x0, 0x0, 0xffffffff) 23:56:21 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:56:21 executing program 5: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:21 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0x0) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000340)={0x3, 0x5eb, [0x4, 0x0, 0x43027a98, 0x5, 0x1], 0x9}) io_getevents(r3, 0x5, 0x0, &(0x7f0000000100), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r5 = getpgrp(0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000240)="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") r6 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x0) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xfffffffffffffffe) getuid() setresuid(0x0, 0xfffe, 0xffffffffffffffff) ioprio_get$uid(0x0, 0x0) r7 = geteuid() setresuid(r7, r7, 0x0) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:56:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) [ 728.636025] audit: type=1400 audit(1575244582.120:391): avc: denied { wake_alarm } for pid=27812 comm="syz-executor.5" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 728.648454] audit: type=1400 audit(1575244582.120:392): avc: denied { wake_alarm } for pid=27816 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 23:56:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) 23:56:22 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000280)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 23:56:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) 23:56:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r2, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) 23:56:23 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x4ff60, 0x0) 23:56:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x318, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) 23:56:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000000)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r1 = epoll_create1(0x0) dup2(r1, r0) 23:56:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x318, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) 23:56:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) 23:56:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) 23:56:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r2, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) 23:56:25 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0xe}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x318, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) [ 732.100482] audit: type=1400 audit(1575244585.580:393): avc: denied { create } for pid=27860 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 23:56:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r2, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) [ 732.261674] audit: type=1400 audit(1575244585.730:394): avc: denied { create } for pid=27860 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=0 23:56:25 executing program 2: socket(0x0, 0x0, 0x0) mkdir(0x0, 0xc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x810000, &(0x7f0000000380)='^\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') write$FUSE_DIRENT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00c6dccbf2786c24918613eb80f3a845f3e028fd365d8bb1040c01f1743db40e4ac764b9cf4cf6603efc79cc09a9ebce2385c3132f1e4169d356c73dcf4b334179705ea723619c16d8e0ca9fb3c2d0899e634d8eca930522fade57477c4a22f6ed6101"], 0x58) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) 23:56:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x318, &(0x7f0000000300)={&(0x7f0000000000)=@ipv6_delroute={0x24, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x6, 0x4}]}, 0x24}}, 0x0) 23:56:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) open(0x0, 0x40c5, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffffffffffff) 23:56:26 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0xe}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r2}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c0000001800f9f90000000000000000020000000000fe020000000008000400", @ANYRES32=r2, @ANYBLOB="08000700ad1414aa"], 0x2c}}, 0x0) 23:56:26 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() getpriority(0x2, r0) 23:56:26 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="25fd307bd4b3be25456a2f0ef5d8a76e5db185fba0964730d21538bd50497e76679f7eaca437bbd0aa3d01599f3b192388e05be747b0611d896aaceb8e1994b9f616a02ce24eec29e70e86d822b8dd47d3902ffe48206e92e0ae1f0b12732cb1c8f626a4e9de91e30038bbb4554be412e4eef91b4eae3974c4db717e750a576c2a", @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba834057548c402cc43b3897ccb5430331f633e7ec46c40d42cc3aa39f2441d8ece5ff1b9d9e2afb674462b435729c12b0f1c4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef0000000000000000000f3b2f0153f745a5b91362e29d8eea8a7aed0f319ead6f4c7da3b54dc66b40f53cb2a56", @ANYRESHEX], 0x0, 0x179}, 0x20) tkill(r0, 0x3b) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:26 executing program 2: socket(0x0, 0x0, 0x0) mkdir(0x0, 0xc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x810000, &(0x7f0000000380)='^\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') write$FUSE_DIRENT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00c6dccbf2786c24918613eb80f3a845f3e028fd365d8bb1040c01f1743db40e4ac764b9cf4cf6603efc79cc09a9ebce2385c3132f1e4169d356c73dcf4b334179705ea723619c16d8e0ca9fb3c2d0899e634d8eca930522fade57477c4a22f6ed6101"], 0x58) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) 23:56:26 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000003f, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0), 0x4) bind$inet(r0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xc, 0x0, 0x0) 23:56:27 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() getpriority(0x2, r0) 23:56:27 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() getpriority(0x2, r0) 23:56:27 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000003f, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0), 0x4) bind$inet(r0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xc, 0x0, 0x0) 23:56:27 executing program 2: socket(0x0, 0x0, 0x0) mkdir(0x0, 0xc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x810000, &(0x7f0000000380)='^\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') write$FUSE_DIRENT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00c6dccbf2786c24918613eb80f3a845f3e028fd365d8bb1040c01f1743db40e4ac764b9cf4cf6603efc79cc09a9ebce2385c3132f1e4169d356c73dcf4b334179705ea723619c16d8e0ca9fb3c2d0899e634d8eca930522fade57477c4a22f6ed6101"], 0x58) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) 23:56:27 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00', &(0x7f0000000780)=""/209, 0xd1) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10) 23:56:27 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() getpriority(0x2, r0) 23:56:29 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0xe}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:29 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000003f, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0), 0x4) bind$inet(r0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xc, 0x0, 0x0) 23:56:29 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'sdx', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$chown(0x4, r0, 0x0, 0x0) 23:56:30 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="25fd307bd4b3be25456a2f0ef5d8a76e5db185fba0964730d21538bd50497e76679f7eaca437bbd0aa3d01599f3b192388e05be747b0611d896aaceb8e1994b9f616a02ce24eec29e70e86d822b8dd47d3902ffe48206e92e0ae1f0b12732cb1c8f626a4e9de91e30038bbb4554be412e4eef91b4eae3974c4db717e750a576c2a", @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba834057548c402cc43b3897ccb5430331f633e7ec46c40d42cc3aa39f2441d8ece5ff1b9d9e2afb674462b435729c12b0f1c4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef0000000000000000000f3b2f0153f745a5b91362e29d8eea8a7aed0f319ead6f4c7da3b54dc66b40f53cb2a56", @ANYRESHEX], 0x0, 0x179}, 0x20) tkill(r0, 0x3b) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:30 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00', &(0x7f0000000780)=""/209, 0xd1) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10) 23:56:30 executing program 2: socket(0x0, 0x0, 0x0) mkdir(0x0, 0xc) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) fstat(0xffffffffffffffff, &(0x7f0000000500)) socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x810000, &(0x7f0000000380)='^\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') write$FUSE_DIRENT(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="00c6dccbf2786c24918613eb80f3a845f3e028fd365d8bb1040c01f1743db40e4ac764b9cf4cf6603efc79cc09a9ebce2385c3132f1e4169d356c73dcf4b334179705ea723619c16d8e0ca9fb3c2d0899e634d8eca930522fade57477c4a22f6ed6101"], 0x58) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) 23:56:30 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00a00117fffffff830923000000000000440b9c3b170b360700e00000000009000b00108d994fd1826b0018"], 0x38) 23:56:30 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000003f, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0), 0x4) bind$inet(r0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0xc, 0x0, 0x0) [ 736.802687] [ 736.804380] =============================== [ 736.808697] [ INFO: suspicious RCU usage. ] [ 736.813063] 4.9.205-syzkaller #0 Not tainted [ 736.817588] ------------------------------- [ 736.821934] include/linux/inetdevice.h:205 suspicious rcu_dereference_check() usage! [ 736.829807] [ 736.829807] other info that might help us debug this: [ 736.829807] [ 736.838106] [ 736.838106] rcu_scheduler_active = 2, debug_locks = 0 [ 736.845147] 4 locks held by syz-executor.1/27958: [ 736.850002] #0: (rcu_read_lock_bh){......}, at: [<00000000281c30ca>] ip_finish_output2+0x20b/0x1280 [ 736.859938] #1: (rcu_read_lock_bh){......}, at: [<0000000080ae6c1f>] __dev_queue_xmit+0x1d4/0x1bd0 [ 736.869801] #2: (_xmit_TUNNEL6#2){+.-...}, at: [<00000000d320e6f6>] __dev_queue_xmit+0x1116/0x1bd0 [ 736.879793] #3: (slock-AF_INET){+.-...}, at: [<000000004a012c6c>] __icmp_send+0x48b/0x1420 [ 736.888982] [ 736.888982] stack backtrace: [ 736.893505] CPU: 1 PID: 27958 Comm: syz-executor.1 Not tainted 4.9.205-syzkaller #0 [ 736.901333] ffff8801ad5f6dd8 ffffffff81b55e6b ffff8801acdfa140 0000000000000000 [ 736.909551] 0000000000000002 00000000000000cd ffff8801a3f18000 ffff8801ad5f6e08 [ 736.917664] ffffffff81406997 ffff8801acdfa198 ffff8801ad5f6f28 ffff8801c4a41100 [ 736.925795] Call Trace: [ 736.928384] [<000000009a1b8fa4>] dump_stack+0xcb/0x130 [ 736.933761] [<0000000094222385>] lockdep_rcu_suspicious.cold+0x10a/0x149 [ 736.940794] [<00000000d88e9b46>] fib_compute_spec_dst+0x6c4/0xcc0 [ 736.947210] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 736.954172] [<00000000d5162767>] ? fib_unmerge+0x4c0/0x4c0 [ 736.960766] [<00000000ec1b33f3>] ? trace_hardirqs_on+0x10/0x10 [ 736.966916] [<0000000041a5a5ea>] ? HARDIRQ_verbose+0x10/0x10 [ 736.972831] [<0000000008670c7e>] __ip_options_echo+0x4be/0x13e0 [ 736.978982] [<00000000e638c219>] __icmp_send+0x648/0x1420 [ 736.984698] [<000000001439230c>] ? __icmp_send+0xc07/0x1420 [ 736.990598] [<00000000f8a632fb>] ? icmpv4_xrlim_allow.isra.0+0x2d0/0x2d0 [ 736.997536] [<0000000041a5a5ea>] ? HARDIRQ_verbose+0x10/0x10 [ 737.003457] [<00000000ec1b33f3>] ? trace_hardirqs_on+0x10/0x10 [ 737.009522] [<00000000e66eb2d3>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 737.016327] [<000000005ea21645>] ? __ip_options_compile+0x668/0x13c0 [ 737.022916] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.029769] [<00000000e40933de>] ? ipv4_link_failure+0x410/0x850 [ 737.036004] [<00000000a70ac84f>] ipv4_link_failure+0x460/0x850 [ 737.042065] [<00000000f257b3e3>] ? ipv4_link_failure+0x32b/0x850 [ 737.048473] [<000000006eab8c30>] ? rt_dst_alloc+0x450/0x450 [ 737.056801] [<000000006eab8c30>] ? rt_dst_alloc+0x450/0x450 [ 737.062606] [<0000000021df732a>] vti6_tnl_xmit+0xb08/0x17f0 [ 737.068407] [<000000002778172a>] ? vti6_dellink+0x270/0x270 [ 737.074243] [<00000000f76fb78b>] dev_hard_start_xmit+0x195/0x8b0 [ 737.080479] [<00000000f5d7d4f6>] __dev_queue_xmit+0x11a3/0x1bd0 [ 737.086647] [<0000000080ae6c1f>] ? __dev_queue_xmit+0x1d4/0x1bd0 [ 737.092978] [<0000000005aaf6e0>] ? __local_bh_enable_ip+0x6a/0xe0 [ 737.099329] [<000000008debc15c>] ? netdev_pick_tx+0x300/0x300 [ 737.105303] [<000000008c764bab>] ? __neigh_create+0x96e/0x1b30 [ 737.111547] [<0000000056b55abb>] dev_queue_xmit+0x18/0x20 [ 737.117186] [<00000000ddfe4b25>] neigh_direct_output+0x16/0x20 [ 737.123428] [<000000002c0c0957>] ip_finish_output2+0x6a2/0x1280 [ 737.129865] [<00000000281c30ca>] ? ip_finish_output2+0x20b/0x1280 [ 737.136193] [<000000004ba0ab5e>] ? rcu_read_lock_held+0x9e/0xc0 [ 737.142866] [<000000006477fdb5>] ? nf_iterate+0x19e/0x310 23:56:30 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 737.148868] [<0000000065ca5159>] ? ip_send_check+0xb0/0xb0 [ 737.154696] [<00000000e66eb2d3>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 737.161748] [<000000007f95eab2>] ? nf_hook_slow+0x12f/0x1f0 [ 737.167559] [<0000000092ab0b2a>] ip_finish_output+0x3c4/0xce0 [ 737.173538] [<0000000031b582a4>] ip_output+0x1ec/0x5b0 [ 737.178933] [<00000000570322ff>] ? ip_output+0x287/0x5b0 [ 737.184600] [<0000000033060ce4>] ? ip_mc_output+0xcb0/0xcb0 [ 737.190408] [<000000006724b20b>] ? nf_hook_slow+0x112/0x1f0 [ 737.196387] [<00000000f4a37117>] ? ip_fragment.constprop.0+0x210/0x210 [ 737.204368] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.211327] [<00000000110ec101>] ? raw_sendmsg+0x1929/0x23e0 [ 737.218815] [<00000000afb4625f>] raw_sendmsg+0x1c5c/0x23e0 [ 737.224555] [<000000002d2a58d8>] ? raw_sendmsg+0x1851/0x23e0 [ 737.230463] [<0000000082ff349a>] ? avc_has_perm+0x164/0x3a0 [ 737.236308] [<00000000a8de2cae>] ? compat_raw_setsockopt+0xd0/0xd0 [ 737.242747] [<0000000046f45259>] ? __lock_acquire+0x5e0/0x4390 23:56:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000040)) [ 737.248815] [<00000000e66eb2d3>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 737.257255] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.264113] [<00000000fec86d73>] ? trace_hardirqs_on_caller+0x582/0x5a0 [ 737.271074] [<00000000ee998141>] ? ip4_datagram_release_cb+0x970/0x970 [ 737.277847] [<0000000041a5a5ea>] ? HARDIRQ_verbose+0x10/0x10 [ 737.283779] [<00000000406ce47b>] ? selinux_msg_queue_alloc_security+0x2e0/0x2e0 [ 737.291412] [<00000000bace4d2a>] ? avc_compute_av+0x2a6/0x610 [ 737.297397] [<00000000a67fa96e>] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 737.304521] [<00000000e66eb2d3>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 737.311288] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.318139] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.325078] [<000000001e4e1ada>] ? check_preemption_disabled+0x3c/0x200 [ 737.331951] [<000000002a92c229>] ? inet_sendmsg+0x143/0x4d0 [ 737.337761] [<00000000c5c1016b>] inet_sendmsg+0x202/0x4d0 [ 737.343398] [<000000004b9b7a9b>] ? inet_sendmsg+0x76/0x4d0 [ 737.349252] [<000000002bb5ca48>] ? inet_recvmsg+0x4d0/0x4d0 [ 737.355070] [<000000005fb8429d>] sock_sendmsg+0xbe/0x110 [ 737.360708] [<00000000a41f187c>] sock_write_iter+0x235/0x3d0 [ 737.366602] [<00000000e08f37f2>] ? sock_sendmsg+0x110/0x110 [ 737.372578] [<00000000fdf638ce>] ? iov_iter_init+0xaf/0x1d0 [ 737.378395] [<0000000083535e61>] __vfs_write+0x3c1/0x560 [ 737.383949] [<000000001787c37a>] ? bpf_fd_pass+0x270/0x270 [ 737.389669] [<0000000020361f63>] ? __vfs_read+0x550/0x550 [ 737.395308] [<00000000f1bc4987>] ? selinux_file_permission+0x85/0x470 [ 737.401977] [<000000007c05f6b2>] ? security_file_permission+0x8f/0x1f0 [ 737.408763] [<0000000075030082>] ? rw_verify_area+0xea/0x2b0 [ 737.414682] [<00000000ba390665>] vfs_write+0x185/0x520 [ 737.420231] [<000000006a6d7264>] SyS_write+0x121/0x270 [ 737.425608] [<000000001346f860>] ? SyS_read+0x270/0x270 [ 737.431067] [<000000001982ab17>] ? do_syscall_64+0x4a/0x5c0 [ 737.436879] [<000000001346f860>] ? SyS_read+0x270/0x270 [ 737.442348] [<000000008d79861f>] do_syscall_64+0x1ad/0x5c0 [ 737.448062] [<0000000058c187b1>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 23:56:31 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00', &(0x7f0000000780)=""/209, 0xd1) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10) 23:56:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000040)) 23:56:32 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="40543e75f5bb03000000e075148c0f34"], 0xe}}, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000040)) 23:56:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00a00117fffffff830923000000000000440b9c3b170b360700e00000000009000b00108d994fd1826b0018"], 0x38) 23:56:34 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="25fd307bd4b3be25456a2f0ef5d8a76e5db185fba0964730d21538bd50497e76679f7eaca437bbd0aa3d01599f3b192388e05be747b0611d896aaceb8e1994b9f616a02ce24eec29e70e86d822b8dd47d3902ffe48206e92e0ae1f0b12732cb1c8f626a4e9de91e30038bbb4554be412e4eef91b4eae3974c4db717e750a576c2a", @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba834057548c402cc43b3897ccb5430331f633e7ec46c40d42cc3aa39f2441d8ece5ff1b9d9e2afb674462b435729c12b0f1c4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef0000000000000000000f3b2f0153f745a5b91362e29d8eea8a7aed0f319ead6f4c7da3b54dc66b40f53cb2a56", @ANYRESHEX], 0x0, 0x179}, 0x20) tkill(r0, 0x3b) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:34 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x0, &(0x7f0000000040)) 23:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00a00117fffffff830923000000000000440b9c3b170b360700e00000000009000b00108d994fd1826b0018"], 0x38) 23:56:34 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) lgetxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=@known='trusted.overlay.redirect\x00', &(0x7f0000000780)=""/209, 0xd1) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10) 23:56:34 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef2faff32460000002f006ce00a00117fffffff830923000000000000440b9c3b170b360700e00000000009000b00108d994fd1826b0018"], 0x38) 23:56:34 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:34 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:35 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:35 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:35 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:37 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="25fd307bd4b3be25456a2f0ef5d8a76e5db185fba0964730d21538bd50497e76679f7eaca437bbd0aa3d01599f3b192388e05be747b0611d896aaceb8e1994b9f616a02ce24eec29e70e86d822b8dd47d3902ffe48206e92e0ae1f0b12732cb1c8f626a4e9de91e30038bbb4554be412e4eef91b4eae3974c4db717e750a576c2a", @ANYRESHEX, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44f937d0492482ba834057548c402cc43b3897ccb5430331f633e7ec46c40d42cc3aa39f2441d8ece5ff1b9d9e2afb674462b435729c12b0f1c4872b0001000000000000f515586de3c101e4f8d1b12b1894ef983d0cfcdfbb1118c5ae060bb6ae2af877735be7b03b5278b53fe125393d6b6adf7f7d0734bc1e5566b4d1447a982f0b0b061ef0000000000000000000f3b2f0153f745a5b91362e29d8eea8a7aed0f319ead6f4c7da3b54dc66b40f53cb2a56", @ANYRESHEX], 0x0, 0x179}, 0x20) tkill(r0, 0x3b) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:56:37 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:37 executing program 4: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:37 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:37 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:37 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:38 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:38 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:38 executing program 4: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:38 executing program 2: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:38 executing program 3: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:56:39 executing program 5: setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x0, 0xfe) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr="5952d46e57660ea29bd239e5bf20e702", @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x1}, {{@in=@remote}, 0x0, @in=@empty, 0x0, 0x4}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) sendto$inet6(r4, &(0x7f00000001c0)="6b9cd8826cd4c653603890", 0xb, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getgid() perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)