[ 11.939568] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.474374] random: sshd: uninitialized urandom read (32 bytes read) [ 16.764985] audit: type=1400 audit(1570876766.038:6): avc: denied { map } for pid=1762 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 16.809167] random: sshd: uninitialized urandom read (32 bytes read) [ 17.399645] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.194' (ECDSA) to the list of known hosts. [ 22.941584] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/12 10:39:32 fuzzer started [ 23.033965] audit: type=1400 audit(1570876772.308:7): avc: denied { map } for pid=1777 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 23.761715] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/12 10:39:33 dialing manager at 10.128.0.26:45091 2019/10/12 10:39:33 syscalls: 1355 2019/10/12 10:39:33 code coverage: enabled 2019/10/12 10:39:33 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/12 10:39:33 extra coverage: extra coverage is not supported by the kernel 2019/10/12 10:39:33 setuid sandbox: enabled 2019/10/12 10:39:33 namespace sandbox: enabled 2019/10/12 10:39:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/12 10:39:33 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/10/12 10:39:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/12 10:39:33 net packet injection: enabled 2019/10/12 10:39:33 net device setup: enabled 2019/10/12 10:39:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist [ 26.054331] random: crng init done 10:40:36 executing program 0: r0 = memfd_create(&(0x7f0000000000)='+!\x00', 0x1) pread64(r0, &(0x7f0000000040)=""/43, 0x2b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000080)='self\xbb\x00'}, 0x30) sched_setscheduler(r1, 0x5, &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x80000001) r3 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt(r3, 0xae1, 0x800, &(0x7f0000000180)="29e49e5439579e0363da393941af07457adb41322d094c3d070bbbf629e920448889ecd73e653464cd3d13a006621a59a056e86312b3dad2f1cb31107d8b628255a49cd0df238892703bd7bd6b587c8ed27f6b7093d6e38826ea43765ede8d2df402a7b5fb2213af7851bcc931413b816d8ac0d5ce0c4be94246f224014c845126ee26e80313ab94fe2c9487f9d9d013e05bb4a9619f02a6d4a3835907aff642e877dd88f185f7bcb66c3b729670ba98ab", 0xb1) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x422002, 0x0) write$P9_RCREATE(r4, &(0x7f0000000280)={0x18, 0x73, 0x1, {{0x0, 0x4, 0x8}, 0x6}}, 0x18) ioctl$TIOCMGET(r4, 0x5415, &(0x7f00000002c0)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000300)={'ah\x00'}, &(0x7f0000000340)=0x1e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) ptrace$getsig(0x4202, r6, 0x736376b5, &(0x7f00000003c0)) ptrace$cont(0x9, r1, 0x80, 0x0) write$P9_RMKNOD(r4, &(0x7f0000000440)={0x14, 0x13, 0x2, {0x0, 0x1, 0x1}}, 0x14) syz_open_dev$rtc(&(0x7f0000000480)='/dev/rtc#\x00', 0x8, 0x100) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKRESETZONE(r7, 0x40101283, &(0x7f0000000500)={0x4622, 0x3f}) ioctl$KDDISABIO(r3, 0x4b37) r8 = syz_open_pts(0xffffffffffffffff, 0x480000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)=0x0) ioctl$TIOCSPGRP(r8, 0x5410, &(0x7f0000000580)=r9) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000600)={0xee9a, 0x5, 0x721b9fbd, 0x1, 0x8, 0x90, 0x3f, 0x2, 0xcc, 0x340f8f31, 0x6, 0x3}) r10 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self\x00', 0x200, 0x0) fallocate(r10, 0x1, 0x2, 0x31f) r11 = dup(0xffffffffffffffff) ioctl$TIOCEXCL(r11, 0x540c) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGKEYCODE(r12, 0x80084504, &(0x7f0000000680)=""/87) 10:40:36 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000000)={0x5, 0x0, 0xffffff81, 0x1}) r1 = epoll_create1(0x180000) write(r1, &(0x7f0000000040)="0bfa15c9b630b2b07b96be94bdde3ad4367f034de644bd72d6d392009bee952f0a829eced3edc363eefbc86941f3709c4262a59f47b90108ae48660d563c36793ec6e5af60911b5078dd383b00c4d4b53e18ec7fac43c46e944942d7ac22912b3f24c8038aaa56e85bb33a4b9a6a43489738f20d23d2777628a3b7e773dbd3476a455404a5fbe361ccad9e5b4f0db541d6994c392ea57fe8a9fff83ce159591cd2da9c57ccca6f404dbedfa59dc4c485fbf4516767b6cc791b92a0779d5879dec9a442aea3a3c4a5f7811cd3b99457b2ecd8a5d537c581c1a4b24e1408", 0xdd) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e24, @loopback}, 0x1, 0x0, 0x0, 0x0, 0xfff, &(0x7f0000000140)='ip6gretap0\x00', 0x4, 0xc0000000000, 0x3}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=@ipv6_getaddr={0x64, 0x16, 0x4, 0x70bd27, 0x25dfdbfc, {0xa, 0x0, 0x1c, 0xff, r3}, [@IFA_FLAGS={0x8, 0x8, 0x152}, @IFA_FLAGS={0x8, 0x8, 0x20}, @IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1d}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x6ce3) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000480)={0x7, &(0x7f0000000440)=[{0x77, 0x8, 0x1}, {0x6, 0x27, 0x7f, 0x3}, {0x1, 0x67, 0xfd}, {0x0, 0xff, 0x3, 0x1}, {0x7, 0xff, 0x7f}, {0x7fc0, 0x0, 0x1, 0x4}, {0x1, 0x81, 0x20, 0x380}]}) r4 = creat(&(0x7f00000004c0)='./file0\x00', 0x20) ioctl$BLKRRPART(r4, 0x125f, 0x0) r5 = open(&(0x7f0000000500)='./file0\x00', 0x2000, 0x53) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000580)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0}, &(0x7f0000000740)=0x14, 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b40)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d80)={'team0\x00', r3}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast1, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000fc0)={@remote, @loopback, 0x0}, &(0x7f0000001000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000001200)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003bc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003c40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003e40)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000003e80)={@local, 0x0}, &(0x7f0000003ec0)=0x14) getpeername$packet(r4, &(0x7f0000003f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003f40)=0x14) accept$packet(r4, &(0x7f0000003f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003fc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000004100)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r5, &(0x7f0000004bc0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000004b80)={&(0x7f0000004140)={0xa20, r6, 0x0, 0x70bd25, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x10c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8025}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r8}, {0x254, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8fa}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x160, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r3}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x1, 0x3, 0x0, 0x10001}, {0x1ff, 0xff}, {0x101, 0x2, 0xff, 0xfffff224}, {0x3, 0x1, 0x0, 0x3ff}, {0x9, 0x7, 0x42, 0x3ff}, {0x90df, 0x4, 0x20, 0xbc5c}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffff001}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r3}, {0x1e8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x1a8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1ff, 0x82, 0x0, 0x25}, {0x4, 0x5b, 0xbc, 0x9}, {0x2, 0x0, 0x7f, 0x101}, {0x59, 0x4a, 0x7, 0x5}, {0x0, 0x5, 0x3f, 0x8}, {0xb0, 0x4, 0x2, 0x9}, {0x67, 0x1f, 0x19, 0x7}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffff7}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r18}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x80, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff8001}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}]}, 0xa20}, 0x1, 0x0, 0x0, 0x20000080}, 0x40885) 10:40:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44008}, 0x4000000) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x0) fchdir(r2) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self\x00', 0x400, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000200)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000280)={0x21f, 0xfffffffd, 0xfffffff8, 0x2, 0x0, 0x0, 0x4, 0x2, 0x1, 0x5, 0x4, 0x7ff}) r5 = accept$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000400)=0x0) fcntl$setown(r6, 0x8, r7) r8 = syz_open_procfs(r7, &(0x7f0000000500)='net/netfilter\x00') perf_event_open$cgroup(&(0x7f0000000480)={0x4, 0x70, 0x1f, 0x65, 0x3f, 0x40, 0x0, 0x8, 0x60000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000440), 0x1}, 0x10, 0x10001, 0x4, 0x0, 0x1f, 0x7, 0x8}, r8, 0x5, r4, 0x5) ioctl$EVIOCGBITSW(r8, 0x80404525, &(0x7f0000000540)=""/189) r9 = accept$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000640)=0x1c) sendto$inet6(r9, &(0x7f0000000680)="4e8afdb76861af7a8059fe2ae172eeff27eec4b168799d661d623e37c9d39d17ad1210808917b9749a7e902de8128e9598016d4e0f869e5c95", 0x39, 0x10, &(0x7f00000006c0)={0xa, 0x4e23, 0x6, @empty, 0x8}, 0x1c) r10 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r10, 0x29, 0x15, &(0x7f0000000700)={@loopback}, &(0x7f0000000740)=0x14) syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x3, 0x2) r11 = open(&(0x7f00000007c0)='./file0\x00', 0x2000, 0x18) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000840)='fou\x00') sendmsg$FOU_CMD_GET(r11, &(0x7f0000000900)={&(0x7f0000000800), 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x2c, r12, 0x800, 0x70bd29, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="ccf559ba7daefbcc8012675d5e25a585"}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000940)={0xc73, 0x8, 0x0, [{0x98a7, 0x5, 0x4, 0x86, 0x1f, 0x9, 0x8}, {0x3, 0x4, 0x2, 0x1, 0x3, 0xf8, 0xeb}, {0xe252, 0x100, 0xa14d, 0x6, 0x9, 0x20}, {0x2, 0x4, 0x5cd4, 0x9, 0x1, 0x0, 0x80}, {0x2, 0x10001, 0x29e, 0xaf, 0x40, 0x5, 0x80}, {0x36d7, 0xe000000, 0x3, 0x0, 0x0, 0x9, 0x9}, {0x8, 0x4f, 0x6, 0x1, 0x7, 0x7, 0x5}, {0x2, 0x6, 0x1, 0x0, 0x4, 0x9, 0x48}]}) r13 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000b80)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TUNSETPERSIST(r13, 0x400454cb, 0x0) getpeername(r5, &(0x7f0000000bc0)=@generic, &(0x7f0000000c40)=0x80) mknod(&(0x7f0000000c80)='./file0\x00', 0x22c6814e6b5dd17f, 0x30) 10:40:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003c80)='pids.events\x00', 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000003cc0)={0x0, 0x2710}, 0x10) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000003d00)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000003d40)=0x8) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000003e00)='syz1\x00', 0x200002, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000003e40)='/proc/self/net/pfkey\x00', 0x80, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000003d80)={0x1, 0x70, 0x0, 0x40, 0x68, 0x0, 0x0, 0x1, 0xac607, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x20, 0x0, 0x6, 0x4, 0x0, 0x978e}, r2, 0x9, r3, 0x3) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000003e80)={{{@in6=@mcast1, @in6=@empty}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000003f80)=0xe8) sendmsg$sock(r1, &(0x7f0000005340)={&(0x7f0000003fc0)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f00000052c0)=[{&(0x7f0000004040)="20e773476b7452e78cc47a9fe58ad45d3380ecae16eaab2e496d45734c", 0x1d}, {&(0x7f0000004080)="ff94824431bfa7ac586f637ca2faeef42f8e1e7182e1a804260e31e739f0bfe0a682e6781b4d6115000206607470d8c328b0c2ab", 0x34}, {&(0x7f00000040c0)="21c3552e66a5e7d3f13b6b22d867a6b926982bd1a1113a611558115ba51ccbfc3825092160f53e49155f4a27e3ad4f2f05f8832a39b5871b0e45f4791c4c92ebe6eb7ea6d2", 0x45}, {&(0x7f0000004140)="22fe9d8041b56ec5cf21545b26a2e4724692a12565ce460c9d222303efb1ab8994725be84e7bb3c64e7e1699e367a0ef0bd423df53ab7e163e05f6a461e32fc56d1cade83ba7b93ba87fadb3cfd63c0b024e1356b942", 0x56}, {&(0x7f00000041c0)="d594e4e78c6813329670525c088ece1515f92699b2976840a40a4b", 0x1b}, {&(0x7f0000004200)="113e6069b5226787203f5177c672dce1c82438d6283f5aa93ec72b5a4b9095fea714e7722f88bfb290cdd75911cf8f25d20772550f580adb063bc2ec96701892140d7c22c05f59b4", 0x48}, {&(0x7f0000004280)="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", 0x1000}, {&(0x7f0000005280)="531c47ac84130dc4a59e843b8068c1dd8e1507debc92639598298105c8c1ac0a6ed4694f087420", 0x27}], 0x8}, 0x41) r5 = creat(&(0x7f0000005380)='./file0\x00', 0x14a) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f00000053c0)={0x4, 0x268, 0x3f}) r6 = dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f0000005400)=0xc, 0x4) r7 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000005440)='/selinux/load\x00', 0x2, 0x0) pread64(r7, &(0x7f0000005480)=""/97, 0x61, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setsig(r8, 0xa, 0x15) r9 = creat(&(0x7f0000005500)='./file0\x00', 0x141) recvfrom$unix(r9, &(0x7f0000005540)=""/135, 0x87, 0x10, 0x0, 0x0) preadv(r4, &(0x7f0000005600), 0x0, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005640)='/dev/ptmx\x00', 0x260000, 0x0) ioctl$TIOCGSERIAL(r10, 0x541e, &(0x7f0000005740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000005680)=""/162}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000057c0)) signalfd(0xffffffffffffffff, &(0x7f0000005800)={0x8}, 0x8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000005840)={{0x1, 0x0, @reserved="a8e3fa0f539b6ac2b00c89cef1c72b7e21f8a8194435d856bb5027b477f7a8c6"}}) lsetxattr$trusted_overlay_origin(&(0x7f0000005880)='./file0\x00', &(0x7f00000058c0)='trusted.overlay.origin\x00', &(0x7f0000005900)='y\x00', 0x2, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005ec0)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000005fc0)=0xe8) r12 = getuid() syz_mount_image$vfat(&(0x7f0000005940)='vfat\x00', &(0x7f0000005980)='./file0\x00', 0x7ff, 0x6, &(0x7f0000005e00)=[{&(0x7f00000059c0)="a32f946d47295a15e8017fe81647db19824885687b1bfafc70bfe1de49c69be2daa719531f2bb3b0821172b03ac760018e64f2e675157c6388fc4fa0638e83c9244b663a8640ed51fdbdb6608797a452c4ad1f05313db7fc04218fe2aa7382c73234fb037e138b028338e2989a5b44ab941a1275409523dea1631517ac8a876cedc008dc26b490ee2324c463c837f670475b758563c95b9b749a35fde1abd5ae7b2ae648c1962ee5375dd269b53aebfb5ac2fe458c002599016982d1bcaf83f3e9a4f56d7e313f45a4e8e892ab3529573eae554021f7da85cc855fee44b8de584fb94e8e9129248e09d6c9bb53de35dd3c980576261f", 0xf6, 0x10001}, {&(0x7f0000005ac0)="450934af3ea01a8d5fbab35508f83b7c63d431449c4c04bbbeab802b00eede088723f11deeb883901b6e861b811f18383363cc74cdb1913b70fd1193318952509209acff096a8b20027f05af06e473573d565780", 0x54}, {&(0x7f0000005b40)="e3db48ce27481cf7b932fcab04436ffb2398f1a6c914f5c812f1f2dc581277a06cc4edba451de9bd91d3d6dd80b89423fb424875fb66024df284bc0b5b9ab5a4a708416a30539f45427b5ccfac71cb01a9152493168d8e8889a7e4716c7717bfe07116ccc2df2a0d42c90ccde900", 0x6e, 0x1}, {&(0x7f0000005bc0)="69145031ba01f1861b2da05a7408f8b23557f1f6538b719e7c9efceb7343f1aef274799756622672e65f36dba5d9ef153f8fb6a13136f2e3881c39e458897a305d2a0da68b0107c37059c907f173baeb89eca3230bc8ca25b467c4c560d9449a58afd76815967eeb16981dbf648560183cdacf70b0119812350e1f", 0x7b, 0x100000001}, {&(0x7f0000005c40)="9584bd812fb803c16a1a856afb6cebc4c890ffc394743757fa2224e7aa90a160344df7a7740250da6d5f8c88a3bc0f1c321ca68cda23ea50a78c4dbbd382dba407e8524008b4e3c35ed1cc3e20b2698878c4aa5d58586b042ea0e5bcf401be4b73b913ccb1925ae45488a65a48c2898b08ba7073f0aff9577acc5a7857f93d83835e30ab8b63188dc0ca4962692a1d2c586f91dfaa40f20423abfe68fa91cc76", 0xa0, 0x7}, {&(0x7f0000005d00)="f9cc1f18a0291c5ac259ec910baa4432a091dfc5ea70028dfb2d325b8be4f29e0aa0080c6d1a01207b24bd414c6759425cb2269d12293841e44403a250f13ac6b30a19b89cea12fe66fa3ebb0df4ed62d81342ba3e55d4df4596cf76db7061cf1852a40bcb3e66d53d41b0121c3be30e0bb9a597e83e2db18811cc4cbe6f159f3845d92aac0b9bae9018b7dd1315fb1ed1f98597bfec7030dccec358178aebb71bdafadce0c57f82e50e920955bf0d63eaa8d2280a957732d02c26701c15c73c474dfcc72ed9ebbaf1481ebd563bacb5f3d5fa51", 0xd4, 0x1}], 0x4000, &(0x7f0000006000)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}], [{@fowner_gt={'fowner>', r11}}, {@pcr={'pcr'}}, {@subj_role={'subj_role', 0x3d, 'syz1\x00'}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>', r12}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/ptmx\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0(eth1$bdevwlan1wlan0&}*self'}}, {@obj_type={'obj_type', 0x3d, 'pids.events\x00'}}]}) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000006100)='/dev/loop-control\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r13, &(0x7f0000006140)='trusted.overlay.redirect\x00', &(0x7f0000006180)='./file0\x00', 0x8, 0x1) 10:40:36 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) getsockopt$packet_int(r0, 0x107, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8000, 0x0) readv(r1, &(0x7f00000026c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/104, 0x68}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/99, 0x63}, {&(0x7f0000002340)=""/217, 0xd9}, {&(0x7f0000002440)=""/104, 0x68}, {&(0x7f00000024c0)=""/168, 0xa8}, {&(0x7f0000002580)=""/58, 0x3a}, {&(0x7f00000025c0)=""/238, 0xee}], 0x9) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002780)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002800)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000002940)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002900)={&(0x7f0000002840)={0x88, r3, 0x10, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fc000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x95}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x902}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8000041}, 0x8000) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000002980)) fsetxattr$security_selinux(r0, &(0x7f00000029c0)='security.selinux\x00', &(0x7f0000002a00)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x3) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000002a40)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000002a80)=0x2400014) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000002ac0)=0x6) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002b00)='/selinux/mls\x00', 0x0, 0x0) connect$inet(r6, &(0x7f0000002b40)={0x2, 0x4e20, @empty}, 0x10) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/null\x00', 0x80000, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000002c00)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f0000002cc0)={&(0x7f0000002bc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002c80)={&(0x7f0000002c40)={0x1c, r8, 0x200, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000002d00)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r9, 0x8004745a, &(0x7f0000002d40)) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000002e40)='/dev/full\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(r10, &(0x7f0000003040)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x4000022}, 0xc, &(0x7f0000003000)={&(0x7f0000002ec0)={0x120, r3, 0x20, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x841}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8fa1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xecb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x35e}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xae3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x94fe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x40051}, 0x40890) r11 = accept(0xffffffffffffffff, &(0x7f00000045c0)=@ethernet={0x0, @local}, &(0x7f0000004640)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000004780)={0x11, 0x0, 0x0}, &(0x7f00000047c0)=0x14) sendmsg$nl_route_sched(r11, &(0x7f0000004940)={&(0x7f0000004680)={0x10, 0x0, 0x0, 0x80000090}, 0xc, &(0x7f0000004900)={&(0x7f0000004800)=@newtclass={0xe8, 0x28, 0x8, 0x70bd27, 0x25dfdbff, {0x0, r12, {0x10, 0x1}, {0xffe0, 0x6}, {0xe, 0xfff1}}, [@TCA_RATE={0x8, 0x5, {0x0, 0x24}}, @TCA_RATE={0x8, 0x5, {0x19, 0x7f}}, @TCA_RATE={0x8, 0x5, {0x7, 0x1f}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x1c, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x8}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0x80}, @TCA_QFQ_WEIGHT={0x8}]}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x24, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x6}, @TCA_QFQ_LMAX={0x8, 0x2, 0x3}, @TCA_QFQ_LMAX={0x8, 0x2, 0x7fffffff}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0x2}]}}, @TCA_RATE={0x8, 0x5, {0x81, 0x5}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x24, 0x2, [@TCA_HFSC_FSC={0x10, 0x2, {0xfff, 0xffffffff, 0x400}}, @TCA_HFSC_FSC={0x10, 0x2, {0x6, 0xd2a, 0x2}}]}}, @TCA_RATE={0x8, 0x5, {0xcc, 0x8}}, @tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x40}}}, @TCA_RATE={0x8, 0x5, {0xbd, 0x6}}]}, 0xe8}, 0x1, 0x0, 0x0, 0x200c015}, 0x4) pipe2(&(0x7f0000004980)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BINDER_WRITE_READ(r13, 0xc0306201, &(0x7f0000004dc0)={0x90, 0x0, &(0x7f0000004c00)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68, 0x18, &(0x7f0000004a80)={@fda={0x66646185, 0x9, 0x0, 0x2f}, @ptr={0x70742a85, 0x1, &(0x7f00000049c0)=""/135, 0x87, 0x0, 0x30}, @fda={0x66646185, 0xa, 0x0, 0x25}}, &(0x7f0000004b00)={0x0, 0x20, 0x48}}}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x656674a44a2a4a8a, 0x0, 0x0, 0x50, 0x18, &(0x7f0000004b40)={@flat=@weak_handle={0x77682a85, 0x1000, 0x1}, @fd={0x66642a85, 0x0, r5}, @fda={0x66646185, 0x1, 0x2, 0x3a}}, &(0x7f0000004bc0)={0x0, 0x18, 0x30}}}, @increfs={0x40046304, 0x1}], 0xd2, 0x0, &(0x7f0000004cc0)="46c7ac0399e5e4ea369fe4ad7492e2f66a3b769725e75f5ec11823a1d8a3aafe8f6e7f97476690b2db60cb111265b4de4518bdb644b83a51c9b3837ac2651d0b14c14629cd29dfccb6662260106b697d0c57157c5490151a5809d631fd20c4f34fe845f52a3d27a1cfcc03af98c0332da95fade0ca089babd25beec395188b44ce7fe0fabc16bed05d0e2d770f9e7cfe8411899ac8f7f7f1a49229e1eabf5f259ca9de84cd7c46e13306ef2951cc3588de48c73ef99d34dd7b84e34daf2f9e23cb58d87a78fddfd4b2e24f9953fa2a2839a1"}) ioctl$PPPIOCSDEBUG(r6, 0x40047440, &(0x7f0000004e00)=0x1) fstatfs(0xffffffffffffffff, &(0x7f0000004e40)=""/249) 10:40:36 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x250) write$tun(r0, &(0x7f0000000040)={@void, @val={0x2, 0x4, 0x9, 0x0, 0x1, 0x1000}, @ipx={0xffff, 0x8d, 0x7e, 0x8563a14096170e17, {@random=0x6, @random="2c201ce6b1b6", 0x4}, {@broadcast, @current, 0x9}, "926ca49e237dc114946799daec69cd8915582c4095a2815be58a990dd3d33d4ab7cf3cdacbee677fd6a65bdb61b83e931fac768b2d4c12950460403a222107364f80d2b8b105c1cc6d2af3e2c8988f22966f56d165b29bef5ef7eb758e5665af6dbd282c8d09bece7cbeb582f3026d"}}, 0x97) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x20) write$apparmor_current(r0, &(0x7f0000000100)=@hat={'permhat ', 0x2, 0x5e, ['\\,cgroupcgroup,%.wlan1*@%trusted+vboxnet0\x00', 'proc[\x00', 'cpuset!@\x00', '}\x00', 'nodev\x00']}, 0x5c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000180)={0x471bb12b, 0xfffffff9}) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x40}) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x8000, 0x19c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x4b14289f5b492db6, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0x104) r3 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000480)=0x80, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x800) r4 = socket$inet6(0xa, 0x4, 0x5) sendto$inet6(r4, &(0x7f00000005c0)="a5a58ff1f6a33c9a8dd9dfc1480245175bb0e8f503398cf071d9c77ee4aad1c4e9b811d77cbfbd432f3f649c7d10afa4a9a28c79db5fd00fe67424631516490a66abfc93465a74c0e851bbdc5475c27951e9f50b024130ce416daec23d9a5d311405d9a76f8b4f80a5c5bba144814941c72002239e90a16c03de0bfffb6e4c938cc09e3049fd7e74f3639a29628f37f72f0c2effabb6972c44b4349cc1a30cdc9b6b22dce7d8df0ca76e809fb52abfca", 0xb0, 0x400400c0, &(0x7f0000000680)={0xa, 0x4e23, 0x5, @mcast1, 0x2}, 0x1c) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) recvfrom$inet6(r5, &(0x7f00000006c0)=""/136, 0x88, 0x101, &(0x7f0000000780)={0xa, 0x4e22, 0x6, @mcast2, 0x5}, 0x1c) pipe2(&(0x7f0000002340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000002380)=0xd, 0x4) r8 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000023c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000002400)) r9 = creat(&(0x7f0000002880)='./file0\x00', 0x40) getsockopt$inet_tcp_int(r9, 0x6, 0x12, &(0x7f00000028c0), &(0x7f0000002900)=0x4) rmdir(&(0x7f0000002940)='./file0\x00') r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r10, 0x29, 0x30, &(0x7f0000002980)={0x1, {{0xa, 0x4e23, 0x4, @mcast2, 0x7}}, 0x1, 0x6, [{{0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, {{0xa, 0x4e21, 0x4dc, @remote}}, {{0xa, 0x4e23, 0x1, @remote, 0x5}}, {{0xa, 0x4e21, 0x4f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x202}}, {{0xa, 0x4e22, 0x9, @loopback, 0x10000}}, {{0xa, 0x4e20, 0xfffffeff, @rand_addr="917ef1fe305e0810f5fc5db6f1aa42a7", 0x7}}]}, 0x390) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/ashmem\x00', 0x680800, 0x0) r11 = syz_open_dev$rtc(&(0x7f0000002d80)='/dev/rtc#\x00', 0x2, 0x20000) splice(r11, &(0x7f0000002dc0), r6, &(0x7f0000002e00), 0xffffffffffffffff, 0x1) fcntl$setlease(r11, 0x400, 0x2) r12 = openat$dir(0xffffffffffffff9c, &(0x7f0000002e40)='./file0\x00', 0x10000, 0x4) clock_gettime(0x0, &(0x7f0000002ec0)={0x0, 0x0}) utimensat(r12, &(0x7f0000002e80)='./file0/file0\x00', &(0x7f0000002f00)={{}, {r13, r14/1000+30000}}, 0x80) [ 87.272516] audit: type=1400 audit(1570876836.548:8): avc: denied { map } for pid=1828 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 90.467324] audit: type=1400 audit(1570876839.738:9): avc: denied { create } for pid=2719 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 90.475301] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=2720 comm=syz-executor.5 10:40:39 executing program 5: setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x68, 0x2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) r0 = socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000240)=0x3d1) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000018007f5300fe01b2a4a280930a04000000a84308910000003900080008000800010000000000156f647284366a660006000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000", 0x55}], 0x1}, 0x0) [ 90.491335] audit: type=1400 audit(1570876839.738:10): avc: denied { write } for pid=2719 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 90.529458] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=2723 comm=syz-executor.5 [ 90.536529] audit: type=1400 audit(1570876839.748:11): avc: denied { read } for pid=2719 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:40:39 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff0000, 0x8}, 0x0, 0x0, 0x62800}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x1ff, {{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x7f, 0x0}, 0x9d9}}}, 0x88) syncfs(r0) memfd_create(&(0x7f0000000000)='{eth1!{GPL-\x00', 0x1) 10:40:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, 0x0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0xc000, 0x400) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$TCSETS2(r1, 0x402c542b, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@remote, @in6=@dev}}, {{@in=@local}}}, &(0x7f0000000380)=0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@empty, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd5f) setresuid(0x0, r3, 0x0) geteuid() geteuid() socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd5f) setresuid(0x0, r5, 0x0) r6 = getegid() setresgid(0x0, 0x0, r6) getgid() r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3b) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r7, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYRES32=r3, @ANYBLOB="02d8083b5ec30f915f6a3faf2da7d408d82f147567a1bd712d1ade7df16c8823c957dfa5bfadaebccc78b7e76df5779a461b45855a3d302c0d1d3e184cd6eb07e4812b9ef49f3d0751412ab08b69a5cb2726cf8b10f9cf", @ANYBLOB="0300070001010000b4080a68c69756a4f16d", @ANYRES64=r7, @ANYBLOB="02000000", @ANYRES32=r5, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="8b7baf64e69e2b7b917a6dfa545e43956dac2a1195a5d460696c9f8d8cd8fc074eeab7a196360fa9e718965f394b56d6827c7ba66d6cdf19aa25f02916d4fb08060074aa03df831e55653d2106921faa2b45e6c34e6bf4231eabc249f2bb039717c7d889cfb9883f59ee192c1f8b1e2088e4ebdb754e55589ee74f886ce2ab9b3a7ea2c6ea83bf0cfc9d00000000000000000000e4936b408e3bf4c439ec133515f6", @ANYBLOB="cd62fd6f", @ANYBLOB], 0xf, 0x1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) write$char_usb(0xffffffffffffffff, &(0x7f0000000140)="6203c7946e31675083152f88a3fd74cb5255acf25530990cbb9f1762866676b159b632f5e098f511b937869ccb9bc65e87b1b0d6c1991cc1f8cf3447d7ca4bc440d1a9e2fd21a42f0a0b672cf4bcc0b30f3b468867e7b9ebf7f7e928025fae8a0ae1167b671687463b590caa89845207701414cdec9655ae4dd386d4aa15e5282564c766b514c633886469a14328277c5d6207bd44f5d6e227f885625065f20e6ef6e06d3865316d24d6d2c75c", 0xad) [ 90.581720] IPv6: Can't replace route, no match found [ 90.588545] IPv6: Can't replace route, no match found 10:40:39 executing program 0: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x10) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000050d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000755000/0x2000)=nil) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) dup2(r2, 0xffffffffffffffff) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) setresuid(0x0, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) write$P9_RGETATTR(r7, &(0x7f0000000580)={0xa0, 0x19, 0x2, {0x400, {0x10, 0x2, 0x3}, 0x30, r8, r9, 0x9, 0x6, 0x8, 0x6, 0xffffffff, 0x7ff, 0x400, 0x4, 0xfffffffffffff075, 0x0, 0x5, 0xfffffffffffffffa, 0xeb4, 0x9, 0x1}}, 0xa0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r11, &(0x7f0000000200)="11e382af36fd016f6e5baaef74f9735713184a43cbf8e6ea35ff89696c672953f71dd0bfe9c69862be6f558b8c2d5ac3f3f42119c07939f6c19e009afb67a5080bb27a6c", &(0x7f0000000280)="941b7dca1bb9e175df095ec63472a1f61d801bef0f3045d3f0c194a7adca25b158ed2932b348f8d931935ddbb7f41830fac3ae32157d75cadb49c74cbf93343029e1dda2245c7610b4bb9c99a895e7d8c48b7f851e7e31b2e76e4bfc45676a0896749ef14c38a72c63870a5208dc9d4a2b968815df5fb21c8864346d0104ec19264be0cf20efa648bab4225df4c3d729bbefc42fe5eea702c1", 0x2}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x200) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r12, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:40:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="f70007000017b62143af0f9738690d92a800e95f090000000000000000000000688d1049b6bccdacc02e098f3cfb04b89e54e13b9980d34adaee1fd60c15d03da0a900000000000000d84000151a0000000000ea00000000"], 0x18) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200400, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(0xffffffffffffffff) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') r8 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) sendmsg$key(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="0200a807070000002abd7000fbdbdf2504000400d795ffff00000000000000000500000000000000d1a8f42af0638d92e600000000ff83000000000000010015004e210000"], 0x38}}, 0x1) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$SO_COOKIE(r8, 0x1, 0x39, &(0x7f0000000640), &(0x7f0000000680)=0x8) sendmsg$TIPC_NL_MEDIA_GET(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="300400000ff8dc3b0b1992623a02e942a7880c8258bfbb3842979088d7fe134455c1e8e45625205304410bb96ca08ddd01004dd1c1cde925561d99faf3e35f52836e72aaced47b97d0c2ff77e441f11851922e4aa4f2f1369cda928e0eef46d3dbd58399a04e15d5ade896cf2365fea1fb43c62c314e00"/128, @ANYRES16=r9, @ANYBLOB="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"], 0x3}}, 0xbd96b9f073d96152) sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r9, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa4b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x440008c0}, 0x42) sendmsg$TIPC_NL_LINK_RESET_STATS(r6, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r9, 0x0, 0x70bd28, 0x0, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff53}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x8800) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x19c, r9, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe8c9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfb}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x20000000}, 0x60000000) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10006804}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x130, r9, 0x62524ef543d74ac2, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4a5a}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb58}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa3}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x205d}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x800}, 0x4018000) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xda72acc578098c1d}, 0xc, &(0x7f0000000240)={&(0x7f00000009c0)={0x1b4, r9, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x446aebac}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xda4a264}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7ff, @remote, 0xfffffff9}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3665, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}}}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendmsg$TIPC_NL_MON_SET(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0xa0, r9, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x44) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) [ 90.705112] hrtimer: interrupt took 24827 ns 10:40:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fed000/0x10000)=nil, &(0x7f0000000080)="6a9dc8042ce16351b445113773c0aa50aa6b0960361641d61d1f56f9b226b39d3e351f7cc28744dce20a8f55f7de318c0befe86b97cb59ae0b3e305eb514b1d07fef4331a6645c625ce6ef6de082c048574613a8436668353184615f041aef71fa5fba8aa52d7ec5ca8dca8458995d5bd5a088a687", 0x75, r3}, 0x68) 10:40:40 executing program 0: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, &(0x7f0000000080)=""/141, &(0x7f0000000140)=0x8d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="182b344c6bc114208cc06d0a4d", 0xd, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff}, 0x1c) sendto$packet(r3, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) r4 = socket(0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$setregset(0x4205, r5, 0x6, &(0x7f0000000180)={&(0x7f0000000440)="678423f343e60434b9f4fac7e0410b394de1b9da28c5edf7dd319c66582c76737afd40fb6ef2ba71190013a4f3a3c87c90afecc9c8fc1fadd3f275ce5585d6deddc35fae33b852b21921a3248b5afa6c6c02573767925a74ea6d6010ebbf1023fe911b2950fc57deec639ec9d5cd04136aa5b7edd94d8e5438a57ead1578c504f02b1ae8f38e48848a2ab0eba6c126e1ecf75d459b425daedb78b1c32b6ea4f64a29e0c73b3cde63d507e7cc4d0f1536ed82f23a952420588aa8da3b0e616e1d9fe2d28448529c6f5d74fbaa7214cadb4dc52bf9d2a1ea01c6", 0xd9}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r4, 0x5, &(0x7f0000000240)="623e9650e3dc3aeadd44cb2f4e05fb354d352d80b49d59d85da91e199e6a77fefe742057ee2f5e2694219f904d7403ecd04baede7098bafc6dce9a0c01bc5b53aa4ea7073a02b9ed3e956a1b0747050a6627cd58d78232e3e5747e3309a8ea544613443e711159855502289a7c628f50382f27025c40a40918a175cdc6a352a8c5084065e7d0c615d3f79ab79573590e9366e806b861fa5a8b3cb2cd1e191945ef40310d2c4536bee0b24888d86f5a1388b1579fae45690e733f4c3ee53dac157184bb683f519370c992f3eaef8aa3a808b4632f97374fe8979faee5c0d95b97283144125cf2c479629db8fc2cda2d5ab1f5c5ba") [ 90.868877] device lo entered promiscuous mode [ 90.934199] device lo left promiscuous mode [ 91.304110] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 10:40:40 executing program 4: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, &(0x7f0000000080)=""/141, &(0x7f0000000140)=0x8d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="182b344c6bc114208cc06d0a4d", 0xd, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff}, 0x1c) sendto$packet(r3, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) r4 = socket(0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$setregset(0x4205, r5, 0x6, &(0x7f0000000180)={&(0x7f0000000440)="678423f343e60434b9f4fac7e0410b394de1b9da28c5edf7dd319c66582c76737afd40fb6ef2ba71190013a4f3a3c87c90afecc9c8fc1fadd3f275ce5585d6deddc35fae33b852b21921a3248b5afa6c6c02573767925a74ea6d6010ebbf1023fe911b2950fc57deec639ec9d5cd04136aa5b7edd94d8e5438a57ead1578c504f02b1ae8f38e48848a2ab0eba6c126e1ecf75d459b425daedb78b1c32b6ea4f64a29e0c73b3cde63d507e7cc4d0f1536ed82f23a952420588aa8da3b0e616e1d9fe2d28448529c6f5d74fbaa7214cadb4dc52bf9d2a1ea01c6", 0xd9}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r4, 0x5, &(0x7f0000000240)="623e9650e3dc3aeadd44cb2f4e05fb354d352d80b49d59d85da91e199e6a77fefe742057ee2f5e2694219f904d7403ecd04baede7098bafc6dce9a0c01bc5b53aa4ea7073a02b9ed3e956a1b0747050a6627cd58d78232e3e5747e3309a8ea544613443e711159855502289a7c628f50382f27025c40a40918a175cdc6a352a8c5084065e7d0c615d3f79ab79573590e9366e806b861fa5a8b3cb2cd1e191945ef40310d2c4536bee0b24888d86f5a1388b1579fae45690e733f4c3ee53dac157184bb683f519370c992f3eaef8aa3a808b4632f97374fe8979faee5c0d95b97283144125cf2c479629db8fc2cda2d5ab1f5c5ba") 10:40:40 executing program 5: lstat(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) r1 = gettid() tkill(r1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0xff, 0x7, 0x3, 0x0, 0xffffffff, 0x4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x10001, 0xa78, 0x0, 0x3, 0xc, 0x5}, r1, 0x7, r2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 91.339781] audit: type=1400 audit(1570876840.608:12): avc: denied { ioctl } for pid=2793 comm="syz-executor.3" path="socket:[9233]" dev="sockfs" ino=9233 ioctlcmd=0x745a scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 91.388301] device lo entered promiscuous mode [ 91.393144] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 10:40:40 executing program 0: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, &(0x7f0000000080)=""/141, &(0x7f0000000140)=0x8d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="182b344c6bc114208cc06d0a4d", 0xd, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff}, 0x1c) sendto$packet(r3, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) r4 = socket(0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$setregset(0x4205, r5, 0x6, &(0x7f0000000180)={&(0x7f0000000440)="678423f343e60434b9f4fac7e0410b394de1b9da28c5edf7dd319c66582c76737afd40fb6ef2ba71190013a4f3a3c87c90afecc9c8fc1fadd3f275ce5585d6deddc35fae33b852b21921a3248b5afa6c6c02573767925a74ea6d6010ebbf1023fe911b2950fc57deec639ec9d5cd04136aa5b7edd94d8e5438a57ead1578c504f02b1ae8f38e48848a2ab0eba6c126e1ecf75d459b425daedb78b1c32b6ea4f64a29e0c73b3cde63d507e7cc4d0f1536ed82f23a952420588aa8da3b0e616e1d9fe2d28448529c6f5d74fbaa7214cadb4dc52bf9d2a1ea01c6", 0xd9}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r4, 0x5, &(0x7f0000000240)="623e9650e3dc3aeadd44cb2f4e05fb354d352d80b49d59d85da91e199e6a77fefe742057ee2f5e2694219f904d7403ecd04baede7098bafc6dce9a0c01bc5b53aa4ea7073a02b9ed3e956a1b0747050a6627cd58d78232e3e5747e3309a8ea544613443e711159855502289a7c628f50382f27025c40a40918a175cdc6a352a8c5084065e7d0c615d3f79ab79573590e9366e806b861fa5a8b3cb2cd1e191945ef40310d2c4536bee0b24888d86f5a1388b1579fae45690e733f4c3ee53dac157184bb683f519370c992f3eaef8aa3a808b4632f97374fe8979faee5c0d95b97283144125cf2c479629db8fc2cda2d5ab1f5c5ba") 10:40:40 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f00000001c0)=0xfffffffe, 0x133) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x0, 0x17, 0x0, 0x1f, 0x0, 0x69, 0x0, 0x2000}}) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000280)="37e0e4e3675a0b91dbab7c7a8688d87bd010d62ac02a012a103f2375c0d828e6b31455f1e752af745e6b4bb59a69da53618f93cb3d40d0138732b435ff3781df9ac0952d742c24a96aa0479bbb3c723365bb983cd991296e035354a37f8b86763fb1ae37e6c0bbb96d4c2a35b40aa09b441f8bb7424fcc3c11f987"}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', &(0x7f0000000540), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xde) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f000072c000/0xa000)=nil, 0xa000, 0x3000, 0x3, &(0x7f0000002000/0x3000)=nil) r2 = open$dir(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) readlinkat(r2, &(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)=""/148, 0x94) r3 = creat(&(0x7f0000001600)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00']) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xfffffe85) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) write$P9_RGETLOCK(r5, &(0x7f00000004c0)={0x25, 0x37, 0x1, {0x0, 0x2, 0xffffffff, r6, 0x7, 'selinux'}}, 0x25) write$P9_RRENAME(r1, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x7) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RLERRORu(r8, &(0x7f0000000680)={0x16, 0x7, 0x1, {{0x9, 'vmnet0GPL'}, 0x1}}, 0x16) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000006c0)={0x7, 0x0, 0x4, 0x7, 0xfffffffffffffffc, 0x9, 0x1000, 0x367d}, &(0x7f0000000700)={0x6, 0x1, 0x6b5, 0x5, 0x80000001, 0x1ff, 0x0, 0x72}, &(0x7f0000000740)={0x9, 0x1f, 0x5, 0x7, 0x800, 0x20, 0x40, 0xffffffffffffff00}, &(0x7f0000000780), &(0x7f0000000800)={&(0x7f00000007c0)={0x6}, 0x8}) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/106) 10:40:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4, 0xfc}]}, 0x30}}, 0x0) 10:40:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @random="da0011897383"}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="5c0000001400210100000000000010000a000000", @ANYRES32=r5, @ANYBLOB="080008000000000014000200002000000000000001d51155e5ccd6ca1400010081c6e56c568488c200f70000000000000000ffffac1e00011400060000000000090000000000000000000000aaf6f412e014d6c04fb9e3187260c5b92c6b175f4486c3efc94ebfef9dd7cbc7626b6e1decc2346a6b72b9d5b1141d9fad60dd0c37a47188758794add75bcc61007520ba7e1fb3237b450e5e8c"], 0x5c}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 10:40:40 executing program 5: lstat(0x0, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) r1 = gettid() tkill(r1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0xff, 0x7, 0x3, 0x0, 0xffffffff, 0x4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x10001, 0xa78, 0x0, 0x3, 0xc, 0x5}, r1, 0x7, r2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 91.476775] device lo left promiscuous mode [ 91.489356] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 91.532255] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 91.557602] ip6_vti0: Invalid MTU 252 requested, hw min 1280 [ 91.580901] device lo entered promiscuous mode [ 91.589802] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 91.604929] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 91.616894] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 91.624074] ip6_vti0: Invalid MTU 252 requested, hw min 1280 10:40:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x70024103, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r3, 0x0) r4 = getegid() r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="2321204c95cf7b288c6aa3686078b9bea02e2f666c65300a00"], 0xb) getresgid(&(0x7f0000000140), 0x0, &(0x7f00000001c0)=0x0) fchown(r5, 0x0, r6) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./fle0\n\x00'], 0xb) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) creat(&(0x7f00000000c0)='./file0\x00', 0x2a) fchown(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB='#! ./fle0\n\x00'], 0xb) getresgid(&(0x7f0000000140), 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000001000100000000000200cd14f04340eb8cca693b76fc3c51570100", @ANYRES32=0xee00, @ANYBLOB="02000300", @ANYRES32=r1, @ANYBLOB="02000000", @ANYRES32=r3, @ANYBLOB="040003000000000008000000", @ANYRES32=0xee00, @ANYBLOB="08000300", @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000100000000002000070000000000"], 0x7c, 0x3) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) 10:40:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4, 0xfc}]}, 0x30}}, 0x0) 10:40:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000080)=0x2) fsync(r1) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000040)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) [ 91.630859] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 91.669629] device lo left promiscuous mode [ 91.712620] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 91.733977] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 10:40:41 executing program 0: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, &(0x7f0000000080)=""/141, &(0x7f0000000140)=0x8d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="182b344c6bc114208cc06d0a4d", 0xd, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff}, 0x1c) sendto$packet(r3, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) r4 = socket(0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$setregset(0x4205, r5, 0x6, &(0x7f0000000180)={&(0x7f0000000440)="678423f343e60434b9f4fac7e0410b394de1b9da28c5edf7dd319c66582c76737afd40fb6ef2ba71190013a4f3a3c87c90afecc9c8fc1fadd3f275ce5585d6deddc35fae33b852b21921a3248b5afa6c6c02573767925a74ea6d6010ebbf1023fe911b2950fc57deec639ec9d5cd04136aa5b7edd94d8e5438a57ead1578c504f02b1ae8f38e48848a2ab0eba6c126e1ecf75d459b425daedb78b1c32b6ea4f64a29e0c73b3cde63d507e7cc4d0f1536ed82f23a952420588aa8da3b0e616e1d9fe2d28448529c6f5d74fbaa7214cadb4dc52bf9d2a1ea01c6", 0xd9}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r4, 0x5, &(0x7f0000000240)="623e9650e3dc3aeadd44cb2f4e05fb354d352d80b49d59d85da91e199e6a77fefe742057ee2f5e2694219f904d7403ecd04baede7098bafc6dce9a0c01bc5b53aa4ea7073a02b9ed3e956a1b0747050a6627cd58d78232e3e5747e3309a8ea544613443e711159855502289a7c628f50382f27025c40a40918a175cdc6a352a8c5084065e7d0c615d3f79ab79573590e9366e806b861fa5a8b3cb2cd1e191945ef40310d2c4536bee0b24888d86f5a1388b1579fae45690e733f4c3ee53dac157184bb683f519370c992f3eaef8aa3a808b4632f97374fe8979faee5c0d95b97283144125cf2c479629db8fc2cda2d5ab1f5c5ba") [ 91.742090] audit: type=1400 audit(1570876841.008:13): avc: denied { create } for pid=2849 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 91.755969] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 91.832204] EXT4-fs (loop2): Unsupported filesystem blocksize 0 (1923657432 log_block_size) [ 91.861702] audit: type=1400 audit(1570876841.018:14): avc: denied { sys_admin } for pid=2849 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 91.876703] ip6_vti0: Invalid MTU 252 requested, hw min 1280 10:40:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x167d, 0x5}) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000006c46f0006000000070000003c9f0300000000000000c208000000000000000100000019676800000000000000000000007fffffffc88100000008d8"], 0xfe66) [ 91.945714] device lo entered promiscuous mode [ 91.968611] device lo left promiscuous mode 10:40:41 executing program 2: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) 10:40:41 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) io_setup(0x0, 0x0) flistxattr(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/11, 0xb}, {&(0x7f00000001c0)=""/249, 0xf9}], 0x2, 0x0) dup2(r0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0x8, 0x0, 0x6, 0x4}, {0x1ff, 0xdd, 0x4, 0xcc82}, {0x2, 0x1, 0x6, 0x1}, {0x2ee3, 0x84, 0x7, 0x2}, {0x7, 0x30, 0xfe, 0x70000}, {0x2, 0x1, 0x5, 0x9}, {0x1, 0x5, 0x9, 0x4}, {0x4, 0x3, 0x4, 0xfff}]}) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x10002, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 92.023760] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) 10:40:41 executing program 0: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x47a4d21bd9b76874, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x101}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r2, 0x0, 0x0, &(0x7f0000000080)=""/141, &(0x7f0000000140)=0x8d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FIONREAD(r1, 0x541b, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000540)="182b344c6bc114208cc06d0a4d", 0xd, 0x48050, &(0x7f0000000580)={0xa, 0x4e23, 0x6, @mcast1, 0xffffffff}, 0x1c) sendto$packet(r3, &(0x7f0000000340), 0xc88f8882, 0x57, 0x0, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000001400)={'lo\x00'}) r4 = socket(0x0, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3b) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) ptrace$setregset(0x4205, r5, 0x6, &(0x7f0000000180)={&(0x7f0000000440)="678423f343e60434b9f4fac7e0410b394de1b9da28c5edf7dd319c66582c76737afd40fb6ef2ba71190013a4f3a3c87c90afecc9c8fc1fadd3f275ce5585d6deddc35fae33b852b21921a3248b5afa6c6c02573767925a74ea6d6010ebbf1023fe911b2950fc57deec639ec9d5cd04136aa5b7edd94d8e5438a57ead1578c504f02b1ae8f38e48848a2ab0eba6c126e1ecf75d459b425daedb78b1c32b6ea4f64a29e0c73b3cde63d507e7cc4d0f1536ed82f23a952420588aa8da3b0e616e1d9fe2d28448529c6f5d74fbaa7214cadb4dc52bf9d2a1ea01c6", 0xd9}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r4, 0x5, &(0x7f0000000240)="623e9650e3dc3aeadd44cb2f4e05fb354d352d80b49d59d85da91e199e6a77fefe742057ee2f5e2694219f904d7403ecd04baede7098bafc6dce9a0c01bc5b53aa4ea7073a02b9ed3e956a1b0747050a6627cd58d78232e3e5747e3309a8ea544613443e711159855502289a7c628f50382f27025c40a40918a175cdc6a352a8c5084065e7d0c615d3f79ab79573590e9366e806b861fa5a8b3cb2cd1e191945ef40310d2c4536bee0b24888d86f5a1388b1579fae45690e733f4c3ee53dac157184bb683f519370c992f3eaef8aa3a808b4632f97374fe8979faee5c0d95b97283144125cf2c479629db8fc2cda2d5ab1f5c5ba") [ 92.064023] SELinux: failed to load policy [ 92.115411] device lo entered promiscuous mode [ 92.228825] device lo left promiscuous mode 10:40:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) signalfd(r2, &(0x7f00000000c0)={0x1ff}, 0x8) r3 = socket$inet(0x2, 0xa, 0x8) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20) 10:40:41 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000011c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0003f010000000000fca0d971e9070000000000000082821a81d5794eff4d5a2882ec196340caa55adc8d5b407087826246dc708a486c55869db2002a506877ad0eaba9a03f89a4fddbaa8d832e322a1120ff6395ed2a9350dd0c9efe5418ba3b1b31f93029ba13ae4d7979d6a644036d6dccbfe067263b"], 0x60}}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) exit(0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 10:40:41 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f00000001c0)=0xfffffffe, 0x133) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x14000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000280)="37e0e4e3675a0b91dbab7c7a8688d87bd010d62ac02a012a103f2375c0d828e6b31455f1e752af745e6b4bb59a69da53618f93cb3d40"}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xde) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000680)={0x0, 0xfb, 0xf5, 0x6, 0x40, "6377889a0e200c1b73be5c35865bb321", "2ae23c3c1e0b4587e69eb47eff7e6c9504dfe43b9d5ce23661f9362ae20deb38c08833ec4e39a664caab7c9f838e2576f3633bdf2b23ebbf386c14faa2e6d95b7201b91615c762156be414baf009dc82b0580a943521b94c18c4333f6e9bc877457a3c4efc828c5ed2c2c86636f86d1bb08a689f81a5e3b14d0d7267c449fe04efc2cf00650447b3c16d1e912139962df263a3c907e02efc9d6e4fd3ea56bc2b99dbaa21792ff6c521c0098b770e608063262222e77089fb9f9307b3b9124489ee4a9de2b482c3514a3d95556e26047e95e75001661f4a8f9f3b1002864bfd93"}, 0xf5, 0x7) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) r4 = open$dir(0x0, 0x0, 0x6) readlinkat(r4, &(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)=""/148, 0x94) r5 = creat(&(0x7f0000001600)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00']) fcntl$setstatus(r5, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r6, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xfffffe85) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000004c0)={0x25, 0x37, 0x1, {0x0, 0x2, 0xffffffff, r7, 0x7, 'selinux'}}, 0x25) write$P9_RRENAME(r1, &(0x7f0000000340)={0x7}, 0x7) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/106) 10:40:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x29109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{0x2, 0x3, 0x9c, 0x3, 0x7}, 0x3, 0x9, 0x5769bcd3}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="8daf6bb1c8f3a37b57480b7897595ad7502a2d7d7025019d6272028f4e769f42a76fe80a51cc031ef34c7f675f0f8322d7ce2939324b8898dfc6314dbd603f244668d90b4694c8cd1d6ba7a7874dd477f326da43f938adf8e7b4667691d50a2122b5838e91", 0x65) ftruncate(r5, 0x200006) socket$inet6(0xa, 0x80000, 0xad) sendfile(r2, r5, 0x0, 0x8000fffffffe) [ 92.647717] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 10:40:42 executing program 2: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) 10:40:42 executing program 0: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) 10:40:42 executing program 5: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) 10:40:42 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000204}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x3cb) close(r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r0) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000004, 0x5) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0x29, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x80000000000701, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$inet6_udp_int(r4, 0x11, 0x65, &(0x7f0000000180)=0x3, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 10:40:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800a1695e0bcfe87b0071") r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) finit_module(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000fc0)={@initdev, 0x0}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f00000013c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f00000096c0)={0x4ec, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x43}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x134, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xb4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffbff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8}, {0xf8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x241}, {0x14b, 0x4, 0x9}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xf5e}}}]}}, {{0x8, 0x1, r7}, {0xc8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x37a, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}]}}]}, 0x4ec}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000140)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000180)=0xc) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r13}]]}}}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000280)={@dev, @remote, 0x0}, &(0x7f00000002c0)=0xc) r16 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r16, 0x1, 0x29, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r16, 0x1, 0x25, &(0x7f0000000000)=0x80000000000701, 0x4) sendto$inet6(r16, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote}, 0x1c) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000000300)={'ifb0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @multicast1, @local}, &(0x7f00000007c0)=0xc) r19 = socket$inet6_tcp(0xa, 0x1, 0x0) r20 = dup2(r19, r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r20, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) r22 = socket$inet6_tcp(0xa, 0x1, 0x0) r23 = dup2(r22, r22) ioctl$PERF_EVENT_IOC_ENABLE(r23, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r23, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000b80)={0x300, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [{{0x8, 0x1, r10}, {0x130, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xfffc, 0x2, 0x2, 0xc255}, {0x9, 0x9, 0x5, 0xc}, {0x9, 0x3, 0x8, 0xfa2335f}, {0x5, 0xb0, 0x0, 0x5}, {0x0, 0xde, 0x81, 0x81}, {0x8, 0x3f, 0x7, 0x1f}, {0x401, 0x7, 0x1f, 0x30a5e47c}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}, {{0x8, 0x1, r15}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x164, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x600000}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r24}}}]}}]}, 0x300}}, 0x4800) [ 93.335705] audit: type=1400 audit(1570876842.608:15): avc: denied { module_load } for pid=2940 comm="syz-executor.3" path=2F6D656D66643A69433B60B6702B10202864656C6574656429 dev="tmpfs" ino=9440 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=system permissive=1 10:40:42 executing program 2: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) [ 93.392128] IPv6: sit1: Disabled Multicast RS 10:40:42 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x7a}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 10:40:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x18475140f06794e8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9d) r3 = dup2(r1, r2) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r3, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r7 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) preadv(r7, &(0x7f0000000340)=[{&(0x7f0000000300)=""/46, 0x2e}], 0x1, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0x29, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x80000000000701, 0x4) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$sock_int(r8, 0x1, 0x2f, &(0x7f0000000180)=0x8000032, 0x4) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_int(r5, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl(0xffffffffffffffff, 0x0, 0x0) 10:40:42 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x4000000000000f4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0045878, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x6) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000100)) chroot(&(0x7f0000000080)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f0000000240)='cpuw$\xe4\x9b\xb6.\xe6\xdfge_sys\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000280)={0x9, 0x4, 0x8, 0xd63, 0xd, 0xfe, 0x80, 0x20, 0x20, 0x6}) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x300000d, 0x2010, r4, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0xf30, 0xea2b}, 0x14) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r7, &(0x7f00000017c0), 0x1b4, 0xc00) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0xffffff3b, 0x0}, 0x10) 10:40:42 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f00000001c0)=0xfffffffe, 0x133) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x14000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000280)="37e0e4e3675a0b91dbab7c7a8688d87bd010d62ac02a012a103f2375c0d828e6b31455f1e752af745e6b4bb59a69da53618f93cb3d40"}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xde) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000680)={0x0, 0xfb, 0xf5, 0x6, 0x40, "6377889a0e200c1b73be5c35865bb321", "2ae23c3c1e0b4587e69eb47eff7e6c9504dfe43b9d5ce23661f9362ae20deb38c08833ec4e39a664caab7c9f838e2576f3633bdf2b23ebbf386c14faa2e6d95b7201b91615c762156be414baf009dc82b0580a943521b94c18c4333f6e9bc877457a3c4efc828c5ed2c2c86636f86d1bb08a689f81a5e3b14d0d7267c449fe04efc2cf00650447b3c16d1e912139962df263a3c907e02efc9d6e4fd3ea56bc2b99dbaa21792ff6c521c0098b770e608063262222e77089fb9f9307b3b9124489ee4a9de2b482c3514a3d95556e26047e95e75001661f4a8f9f3b1002864bfd93"}, 0xf5, 0x7) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) r4 = open$dir(0x0, 0x0, 0x6) readlinkat(r4, &(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)=""/148, 0x94) r5 = creat(&(0x7f0000001600)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00']) fcntl$setstatus(r5, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r6, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xfffffe85) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000004c0)={0x25, 0x37, 0x1, {0x0, 0x2, 0xffffffff, r7, 0x7, 'selinux'}}, 0x25) write$P9_RRENAME(r1, &(0x7f0000000340)={0x7}, 0x7) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/106) 10:40:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup(0xffffffffffffffff) unlinkat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x200) connect$inet(r1, 0x0, 0x0) set_thread_area(&(0x7f0000000100)={0x0, 0x20000800, 0x0, 0x5, 0x2, 0x8, 0x8, 0x800, 0x0, 0x687}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) setresuid(0x0, 0xfffe, 0x0) geteuid() r2 = getpid() r3 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@xdp, 0x0) perf_event_open(&(0x7f000001d000)={0x66f57edcbee3b626, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) writev(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000380)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x78}, 0x1, 0x0, 0x0, 0x40804}, 0x4000) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000580)='trusted.overlay.redirect\x00', &(0x7f00000005c0)='./file0\x00', 0x8, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0xd43c831a59b6800a}, 0xc, &(0x7f0000000500)={&(0x7f0000000740)=ANY=[@ANYBLOB="fe440000d1953947635ccdfae45c85f8f78af17f05cba20fe317be3da39737c575d15f1133843a010aebc625f92b1b001b11bd747e1f8fddb7a6c606dc91335ead324285971a3b08e996afbd31f5d464569f4ba3264affba64f9503d2c48b308f7b19a193039172ab09bbe1ebf4ecc9dbcdce754bf3a2568a3610df2a824b46cbe153565fc3bb23400d2ab6c0449a227f1a033e953d1f3c8bddd154ba3448389296ef443fc360dbab4ebd8daa98103e2212f181551f68684d42aae150db2cbea5005f2"], 0x1}, 0x1, 0x0, 0x0, 0x51}, 0x0) getsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f00000000c0), &(0x7f0000000240)=0x4) rt_tgsigqueueinfo(r2, r2, 0x22, 0x0) readv(0xffffffffffffffff, &(0x7f0000000080), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='./file0\x00') ptrace(0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000380)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000002c0), 0x4) 10:40:43 executing program 2: socket$inet6(0xa, 0x696afeb95ee97b88, 0x6) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x4000) r0 = open(0x0, 0x5, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)=0xfffffffffffffe36) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x11) getpgrp(0xffffffffffffffff) r5 = getpgrp(0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/psched\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) lseek(0xffffffffffffffff, 0x0, 0xd) getsockopt$netlink(r6, 0x10e, 0x0, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) clock_adjtime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ftruncate(r7, 0x7fff) sendfile(r2, r7, 0x0, 0x8040fffffffd) 10:40:43 executing program 0: r0 = socket$inet(0x2, 0x200000000003, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x0, 0x1, [@multicast2]}, 0x14) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000140)={0x495, 0x8, 0x1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) dup2(r5, r0) [ 93.851348] audit: type=1400 audit(1570876843.108:16): avc: denied { map_create } for pid=2968 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:40:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xffffffff, 0x7}, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xff, 0x7f, 0x2f, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae88, 0x3, @perf_config_ext={0xfd, 0x9}, 0x0, 0x2, 0x5d0, 0x7, 0x9, 0x4, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) utimensat(r3, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x3, {{0xa, 0x4e20, 0x8001, @loopback, 0xffff}}}, 0xff22) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000d00300004801000048010000480100000000000040020000380300003803000038030000380300003803000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x430) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) socket(0x2, 0x4, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r4, 0x80003) sendfile(r2, r4, &(0x7f00000000c0), 0x8000fffffffe) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xffff, 0x900) 10:40:43 executing program 5: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xa, 0x0, 0x0) accept4(r1, 0x0, &(0x7f0000000300), 0x800) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x881, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80100, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x201, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) write$P9_RCLUNK(r3, &(0x7f0000000280)={0x7, 0x79, 0x1}, 0x7) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000006, 0x8013, r2, 0x0) 10:40:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000100)='\x00\x00\x00', 0x4) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x8d4e) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) close(r1) splice(r1, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f0000000040), 0x3, 0xe) r4 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x87ffd) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r0, r4, 0x0, 0x800000000024) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x31}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r9}]]}}}]}, 0x40}}, 0x0) sendmsg$inet6(r4, &(0x7f0000000b00)={&(0x7f00000000c0)={0xa, 0x4e23, 0x6, @mcast1, 0x8}, 0x1c, &(0x7f0000000600)=[{&(0x7f00000001c0)="65237f5134f5fe20172028c656c07d08db0282cd561ec8d8461ca9277a9d6d0d8253140916751e47d37cd478c3527f59acdc922f243239205cbb690f637f3a0b05eca96232d998801bd13d3d387441aba4d0580d0bdaa42967b4ce459d750301c037e115b8b32a5d3003d8eb1aa87579f3458de219c3e54f5aceb36b3f33c693e3c2c8ebabfe4c113f1bbb0be373a9f9d53c4860bc2382ea545a38973389b97a44d4f8d79953286d1bd4922766dab228015a91fb764340", 0xb7}, {&(0x7f0000000280)="5ea2f535e5c4ec0c11b1b7f72377f46f9735905df3918c27a7408610edf223561f927ccec3d42ab2d1a2051db54d8b601b59ef340128857d8f6286a844b2662a96b27aee069d6a1129bb4d", 0x4b}, {&(0x7f0000000300)="b996ee2fc0c00b7cfd7f70634d30697f3d2e501147364267952462c19228a17ae6c39b06e027312a97e027b7d74406ce31129323d30e9a08c460d7c0eb561a0c53febe7fa0b3a33cd1c1277257dfc0fb9e51a519d7d20304649b8f8b4d2ff41f16e0b6785b473a96fd76c779130c6dcd7ca855d046fcc3524cab050ecaf9650ccff4d94a9ca15e741525c37c14e0a74190f9a99ae4a02dcc1559bf6c61f900b53dd334dc1b9053b4aa70a31a17f43cee735dd56382", 0xb5}, {&(0x7f00000003c0)="4f771ac518e5245251d972efb2f9540d250c3a38bcefb218f8ef1949d3862c563d8985023c3f95414ee80a27ceeb9c2205dfd28affa19860f9d2d714942314716db0f7b449063a0adc5b64bc39cacd2114512b9c734d31a4b20e12faf218", 0x5e}, {&(0x7f0000000500)="b312f8a768aa3b6f3c6b68184bb3c93a4bc81e311a7b05ce796bcde0451ac109563dd637b1cd810415fcc02e3cc65e31c2e8402892b0ec71ed304565566a096050135c6756ffd71bc718fcda54dbdf07e768e5a915083a3bbf083016c855bdea1280ddee3154414a51201822c656702fdfdb2940031ac2c738033dc9d7ad6460bf88f656ad60c213cd36e10e264bd29d6e66ca46", 0x94}, {&(0x7f0000000440)="6a0c19d1521f9114eb8c865bcd42526df24b49f00bf72ff9a4dc593389fd357e210545b223798d38d0edf8e5360800f233b3fafdbd7c80019386ea4225be29ea9c867f3eb18866e0f6fdb66bde270fb4358cfa3eef474c15ccfeac6ef889748d553bfd59f21f8fba", 0x68}, {&(0x7f00000005c0)="e294", 0x2}], 0x7, &(0x7f0000000680)=[@hopopts={{0x50, 0x29, 0x36, {0x3c, 0x6, [], [@ra={0x5, 0x2, 0x200}, @ra={0x5, 0x2, 0x5}, @generic={0x8, 0xb, "eece3be7680765e9d25a02"}, @pad1, @hao={0xc9, 0x10, @mcast2}, @pad1, @pad1, @jumbo={0xc2, 0x4, 0xfff}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x24}, r9}}}, @rthdrdstopts={{0x28, 0x29, 0x37, {0x2b, 0x1, [], [@pad1, @jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x6}]}}}, @hopopts={{0x48, 0x29, 0x36, {0x2b, 0x5, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x6}, @jumbo={0xc2, 0x4, 0x81}, @enc_lim={0x4, 0x1, 0x9}, @pad1]}}}, @rthdr={{0x78, 0x29, 0x39, {0x73, 0xc, 0x1, 0x4, 0x0, [@rand_addr="2cc836505d3fc64e907be721cfa6fb96", @ipv4={[], [], @multicast2}, @mcast2, @remote, @ipv4={[], [], @local}, @local]}}}, @rthdrdstopts={{0x208, 0x29, 0x37, {0x32, 0x3d, [], [@generic={0x0, 0xe7, "f239fb9a7d0a69ba81f16e138f62f3f1ce81663d8e53a9927654653f85ff0e3e12e4e3b720c5b5bbd0231243e99eada33ebd7bd3830a03d47c1dea6ac2130a7d224d5818e7fcfbbbc09606b46dfcb63da8e61ff6d3446e5bdac165d4f8edb5ad90d53d51bdc3bd445466c773cd85f6221c0fbff73a5bb9754c69e4904c79cba44acbe83ae28d761016c03611bba87a3a4014bd756466149fbc7c3a460316137da296265053dd36f815afdf0c4a81fd70f00e4edf8748bedc9bcb961b30493501262f17f2d4821f00ff48104e4c4069c517c57e5dabe352875cad20daa30326fb927d9ee033e38f"}, @enc_lim={0x4, 0x1, 0x7}, @ra={0x5, 0x2, 0x1}, @generic={0x80, 0xf8, "d3a8080239beec997fd76ac144e4b61089c76757fdc0abe93b3584ab9df866634ff4e61df11a51ae2647c88e883554678992d3e8f49f66fc007ca1d2d8ac56711ff8fd888081c43a69b6f83ccc71d297ed6c19de5b28a0984d6f6f55230bdca80e7b101514c9961be4c20c244d4f8b0e8b875faf3e9fcd8590461c3d29a69175147161a5499f279c7e7814a73848325a8e7a34f9bc7e05da16067415d4ad3e060fc9e8c011c77bd091b5e52d5c0813e7db3846c880768a29ff0309ed8d5ebd29b13ced83437922ac5e40afc18784afbe7c736252be5507c3f39d7d39e0ee4b2c3dcb65ee7b7875dcfdaed5b7d12931512c07706662683096"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @hopopts={{0xe0, 0x29, 0x36, {0xfa, 0x18, [], [@hao={0xc9, 0x10, @local}, @pad1, @pad1, @generic={0x6, 0x8c, "732613d0bc87d13fb60e09173aba90d371a540ad7772a1eb4f40461ae576a40754d7c6d04eaa6279e38ae8a3e2e1f2ad6d8715efbdd567faa65e6248d5c46bc07461b6655130530b1856c21da2b629f047911e6c0b016ddf977b07256f8d558278b28e110d99c571932156ed4b4601ec613cea7a13c114a062c572aba6814d90c423b3f56e99f857471496ed"}, @hao={0xc9, 0x10, @empty}, @jumbo, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x448}, 0x20004000) 10:40:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0xd63c10b7de044f82) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x2, @loopback, 0x100000000004}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect(r0, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='%bdevvmnet0proc%\x00', 0x11, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x7, 0x462, 0x5cd5, 0x8000}) 10:40:43 executing program 5: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000440)={0xa, 0x0, 0x0, @loopback}, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xa, 0x0, 0x0) accept4(r1, 0x0, &(0x7f0000000300), 0x800) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x881, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80100, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x201, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) write$P9_RCLUNK(r3, &(0x7f0000000280)={0x7, 0x79, 0x1}, 0x7) mmap$perf(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000006, 0x8013, r2, 0x0) [ 94.293817] IPv6: sit1: Disabled Multicast RS 10:40:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$inet(r0, &(0x7f0000000780)=[{{&(0x7f00000003c0)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x8ab5cc1fdd217f77, 0x0, [{}]}]}}}], 0x18}}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x14) [ 94.456656] audit: type=1400 audit(1570876843.728:17): avc: denied { create } for pid=3021 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 10:40:43 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='attr/fscreate\x00') socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x1, 0x6) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in6=@ipv4={[], [], @dev}, 0x2, 0xffff, 0x0, 0x1000, 0xa}, {0x0, 0x0, 0x283, 0x0, 0x0, 0x0, 0x27f}, {0x0, 0x0, 0x4}, 0x0, 0x6e6bb3, 0x1, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d3, 0x3c}, 0x0, @in=@loopback, 0x0, 0x1, 0x0, 0x3ff, 0x0, 0x0, 0x629db67c}}, 0xe8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) readv(r1, &(0x7f0000000140), 0x19d) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_V4={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x2a}}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}]}, 0x44}}, 0x1) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x5e) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0xa, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) r7 = dup3(r4, r6, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000100)='highspeed\x00', 0xa) ioctl$KDDELIO(r0, 0x4b35, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) 10:40:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() fstat(0xffffffffffffffff, 0x0) rt_sigaction(0x12, &(0x7f0000000140)={&(0x7f0000000000)="f3430fa6c8c482edddc60f516000c4c37d048700000000ee3e6536660ff91c043626470f1f40000fac7900bb3ef246af3645ed660f644d6c", {0x80000001}, 0x4, &(0x7f00000000c0)="f30f2aacbd7c360000c40258f35c37b76526400fae08f0478111f37f00004790660f610e66900f428508000000f30f1a2ec4a1fd519905000000"}, &(0x7f00000002c0)={&(0x7f00000001c0)="3642dd198f697c802f67f2470f59db66410f0d4e7a653636400fae620540d292efab00006b6ca92af0650f3807280ffd7f6c658ec8", {}, 0x0, &(0x7f0000000240)="670f48fbc48131129fc63742f88f6870efe5f1410f1589000000003e440f3802222e41d9f56666450f71e3fe470f19767466450f38378c7917fada9d46d2f2"}, 0x8, &(0x7f0000000300)) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000180)={0x3}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_rr_get_interval(0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') write$smack_current(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)="6d9f40020fa4103f6fb67f9e68c2065b6544fa9d00385d9a8561aea76adfdb0bf0f3846fd5a0cc60337bb8fc0cd1b59291aa4204509a8635ae775ef38e7195f272976263bc2f67a49c119d8cde0258a5d345cc598e9f8ff45aaeef5fdda911b0af6e1c65457123ac8312f752333d6ec488e8c11058b8b2f92b5da4e41fd5d74e1f472bce1d7ea0e82e6d7652c7db5385a6c252cf9d75d0da92e51bf771f78aee406e1ef714cc3de6c6a2aae865ba15665255e93a0508aef0ff683726856a311c17014f55547bb161791f87e84beb6f330058551ef88d88bd21f3672984", 0xdd) getxattr(0x0, &(0x7f0000000180)=@known='security.capability\x00', &(0x7f0000227f74)=""/140, 0x8c) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RGETLOCK(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="3b00000037010000a8e70000000003000000010000000000", @ANYRES32=0x0, @ANYBLOB="1d00637075736574757365726e6f6465765d6b657972696e676c6f70726f63"], 0x3b) 10:40:43 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f00000001c0)=0xfffffffe, 0x133) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x14000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) r1 = creat(&(0x7f0000000380)='./bus\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000280)="37e0e4e3675a0b91dbab7c7a8688d87bd010d62ac02a012a103f2375c0d828e6b31455f1e752af745e6b4bb59a69da53618f93cb3d40"}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x0, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xde) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000680)={0x0, 0xfb, 0xf5, 0x6, 0x40, "6377889a0e200c1b73be5c35865bb321", "2ae23c3c1e0b4587e69eb47eff7e6c9504dfe43b9d5ce23661f9362ae20deb38c08833ec4e39a664caab7c9f838e2576f3633bdf2b23ebbf386c14faa2e6d95b7201b91615c762156be414baf009dc82b0580a943521b94c18c4333f6e9bc877457a3c4efc828c5ed2c2c86636f86d1bb08a689f81a5e3b14d0d7267c449fe04efc2cf00650447b3c16d1e912139962df263a3c907e02efc9d6e4fd3ea56bc2b99dbaa21792ff6c521c0098b770e608063262222e77089fb9f9307b3b9124489ee4a9de2b482c3514a3d95556e26047e95e75001661f4a8f9f3b1002864bfd93"}, 0xf5, 0x7) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000072c000/0x1000)=nil) r4 = open$dir(0x0, 0x0, 0x6) readlinkat(r4, &(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)=""/148, 0x94) r5 = creat(&(0x7f0000001600)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00']) fcntl$setstatus(r5, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r6, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@initdev, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xfffffe85) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000004c0)={0x25, 0x37, 0x1, {0x0, 0x2, 0xffffffff, r7, 0x7, 'selinux'}}, 0x25) write$P9_RRENAME(r1, &(0x7f0000000340)={0x7}, 0x7) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000200)=""/106) 10:40:43 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') prctl$PR_SET_SECUREBITS(0x1c, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001780)='/dev/zero\x00', 0x400, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x40000c4}, 0x40000) flistxattr(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) write$P9_RLCREATE(r4, &(0x7f0000000300)={0x18, 0xf, 0x2, {{0x425be59d71e8efb9, 0x1, 0x2}, 0x86c}}, 0x18) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) 10:40:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x18475140f06794e8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9d) r3 = dup2(r1, r2) sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r3, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r7 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) preadv(r7, &(0x7f0000000340)=[{&(0x7f0000000300)=""/46, 0x2e}], 0x1, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0x29, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x80000000000701, 0x4) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$sock_int(r8, 0x1, 0x2f, &(0x7f0000000180)=0x8000032, 0x4) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_int(r5, 0x0, 0x1, &(0x7f0000000000)=0x3, 0x4) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, 0x1c) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl(0xffffffffffffffff, 0x0, 0x0) 10:40:44 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffe5e, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='/dev/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000000c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f0000000140)) r4 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet(0x10, 0x3, 0x20000000006) 10:40:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xffffffff, 0x7}, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xff, 0x7f, 0x2f, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae88, 0x3, @perf_config_ext={0xfd, 0x9}, 0x0, 0x2, 0x5d0, 0x7, 0x9, 0x4, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) utimensat(r3, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x3, {{0xa, 0x4e20, 0x8001, @loopback, 0xffff}}}, 0xff22) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000d00300004801000048010000480100000000000040020000380300003803000038030000380300003803000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x430) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) socket(0x2, 0x4, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r4, 0x80003) sendfile(r2, r4, &(0x7f00000000c0), 0x8000fffffffe) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xffff, 0x900) 10:40:44 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xffffffff, 0x7}, 0x3c) socket$inet_udplite(0x2, 0x2, 0x88) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0xff, 0x7f, 0x2f, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae88, 0x3, @perf_config_ext={0xfd, 0x9}, 0x0, 0x2, 0x5d0, 0x7, 0x9, 0x4, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) utimensat(r3, 0x0, &(0x7f0000000240)={{0x77359400}}, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x3, {{0xa, 0x4e20, 0x8001, @loopback, 0xffff}}}, 0xff22) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000d00300004801000048010000480100000000000040020000380300003803000038030000380300003803000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="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"], 0x430) getsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) socket(0x2, 0x4, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r4, 0x80003) sendfile(r2, r4, &(0x7f00000000c0), 0x8000fffffffe) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xffff, 0x900) 10:40:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000080)=0x5, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x80000000000701, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2e, 0x0, 0xfffffffffffffc7b) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000100005070000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001802000800010000000000bb7c17000000000000000000", @ANYRES32=r3], 0x38}}, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x90) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) 10:40:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)={0x1}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) [ 95.107531] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 95.190494] kasan: CONFIG_KASAN_INLINE enabled [ 95.190917] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 95.196156] kasan: GPF could be caused by NULL-ptr deref or user memory access 10:40:44 executing program 3: setxattr$trusted_overlay_origin(&(0x7f00000014c0)='./bus\x00', 0x0, &(0x7f0000001540)='y\x00', 0x2, 0x0) open(0x0, 0x4008040, 0x0) r0 = gettid() fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pause() r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x1ff) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) [ 95.273045] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 95.280352] Modules linked in: [ 95.284084] CPU: 0 PID: 3033 Comm: syz-executor.2 Not tainted 4.14.149+ #0 [ 95.294501] task: 00000000baba2be3 task.stack: 00000000a1afbda5 [ 95.300681] RIP: 0010:kobject_uevent_env+0xa3/0xc60 [ 95.305709] RSP: 0018:ffff8881cc937c08 EFLAGS: 00010206 [ 95.311428] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff1103a1416e4 [ 95.318707] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 95.326292] RBP: ffff8881cc3afcd0 R08: 0000000000000001 R09: 0000000000000003 [ 95.333743] R10: fffffbfff7385ccd R11: ffffffffb9c2e66b R12: 00000000000000a0 [ 95.341043] R13: dffffc0000000000 R14: ffff8881cc3afbc8 R15: 00000000000000a0 [ 95.348344] FS: 0000000001950940(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 95.357552] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 95.364665] CR2: 00007fa501e87038 CR3: 00000001c49f0006 CR4: 00000000001606b0 [ 95.372104] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 95.379521] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 95.386888] Call Trace: [ 95.389512] loop_clr_fd+0x4ab/0xad0 [ 95.393407] lo_release+0x10d/0x1a0 [ 95.397049] ? lo_open+0xb0/0xb0 [ 95.400451] __blkdev_put+0x518/0x6d0 [ 95.404352] ? bd_set_size+0xb0/0xb0 [ 95.408361] ? blkdev_put+0x75/0x4c0 [ 95.412424] ? blkdev_put+0x4c0/0x4c0 [ 95.416390] blkdev_close+0x86/0xb0 [ 95.420295] __fput+0x25e/0x710 [ 95.423572] task_work_run+0x125/0x1a0 [ 95.427572] exit_to_usermode_loop+0x13b/0x160 [ 95.432157] do_syscall_64+0x3a3/0x520 [ 95.436133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.441342] RIP: 0033:0x413741 [ 95.444635] RSP: 002b:00007ffe1383f500 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 95.452351] RAX: 0000000000000000 RBX: 000000000000000f RCX: 0000000000413741 [ 95.459810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000e [ 95.467222] RBP: 0000000000000001 R08: 0000000093d0ae27 R09: 0000000093d0ae2b [ 95.474643] R10: 00007ffe1383f5e0 R11: 0000000000000293 R12: 000000000075c9a0 [ 95.482066] R13: 000000000075c9a0 R14: 0000000000763690 R15: 000000000075bf2c [ 95.489602] Code: 03 42 80 3c 28 00 0f 85 44 0a 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 22 02 00 00 e8 39 1a ab fe 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 10 0a 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 95.509719] RIP: kobject_uevent_env+0xa3/0xc60 RSP: ffff8881cc937c08 10:40:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000c00)={0x1}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) [ 95.522938] ---[ end trace 7bf04f45057d1b36 ]--- [ 95.528525] Kernel panic - not syncing: Fatal exception [ 95.534210] Kernel Offset: 0x36400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 95.545514] Rebooting in 86400 seconds..