x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 18:55:15 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f00000001c0)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000004300000004000000"], 0x14}, 0x0) 18:55:15 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 18:55:15 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 18:55:15 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x4995b042, 0xff, 0x5, 0x21d080000}, {0x3a, 0x0, 0x0, 0x3}, {0x0, 0x400, 0x0, 0x5}]}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000002) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x3}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e1, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 18:55:15 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f00000001c0)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000004300000004000000"], 0x14}, 0x0) 18:55:15 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f00000001c0)=@nl=@unspec={0x2001001000000000}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000004300000004000000"], 0x14}, 0x0) 18:55:15 executing program 1: r0 = socket$inet(0x2, 0x100000000805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0xa, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 18:55:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) 18:55:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="f90600aacde83714"], 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 18:55:15 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) [ 705.123584] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 705.175937] kauditd_printk_skb: 94 callbacks suppressed [ 705.175945] audit: type=1400 audit(1556650516.022:1535): avc: denied { map } for pid=25617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.213284] audit: type=1400 audit(1556650516.022:1536): avc: denied { map } for pid=25617 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.338008] audit: type=1400 audit(1556650516.180:1537): avc: denied { map } for pid=25621 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.405632] audit: type=1400 audit(1556650516.210:1538): avc: denied { map } for pid=25621 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.440703] audit: type=1400 audit(1556650516.280:1539): avc: denied { map } for pid=25623 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.466243] audit: type=1400 audit(1556650516.319:1540): avc: denied { map } for pid=25624 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.503081] audit: type=1400 audit(1556650516.339:1541): avc: denied { map } for pid=25624 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.530411] audit: type=1400 audit(1556650516.379:1542): avc: denied { map } for pid=25625 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.599680] audit: type=1400 audit(1556650516.448:1543): avc: denied { map } for pid=25626 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 705.636080] audit: type=1400 audit(1556650516.478:1544): avc: denied { map } for pid=25626 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000040)={0x3, 0x0, 'client0\x00', 0x0, "4f30be8d74b51bba", "7f4e77bb2f1a711d686e1dcd50951f98f2474fff0f0c3738fcd3b5b20a76d385", 0x6a60, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000100)='./file0\x00', r1, r2, 0x900) 18:55:16 executing program 5: fcntl$getown(0xffffffffffffff9c, 0x9) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000000000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 18:55:16 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a00110001e2f5fe009b8daef85b4b5112dc3a5923e812ff00", 0x27) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) 18:55:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) 18:55:16 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x4995b042, 0xff, 0x5, 0x21d080000}, {0x3a, 0x0, 0x0, 0x3}, {0x0, 0x400, 0x0, 0x5}]}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000002) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x3}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e1, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 18:55:16 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='part=0x0000000000000007,force,uid=', @ANYRESHEX]) [ 705.981360] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 18:55:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) [ 706.035789] hfsplus: invalid uid specified [ 706.051407] hfsplus: unable to parse mount options [ 706.067393] protocol 88fb is buggy, dev hsr_slave_0 [ 706.072613] protocol 88fb is buggy, dev hsr_slave_1 [ 706.117266] hfsplus: invalid uid specified [ 706.123882] hfsplus: unable to parse mount options 18:55:17 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='part=0x0000000000000007,force,uid=', @ANYRESHEX]) 18:55:17 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a00110001e2f5fe009b8daef85b4b5112dc3a5923e812ff00", 0x27) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) [ 706.216874] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 706.307576] hfsplus: invalid uid specified [ 706.339355] hfsplus: unable to parse mount options 18:55:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) 18:55:17 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='part=0x0000000000000007,force,uid=', @ANYRESHEX]) 18:55:17 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a00110001e2f5fe009b8daef85b4b5112dc3a5923e812ff00", 0x27) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) [ 706.506527] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 706.526148] hfsplus: invalid uid specified [ 706.547436] hfsplus: unable to parse mount options 18:55:18 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 18:55:18 executing program 1: socket$packet(0x11, 0x2, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000100)="2700000014000707030e0000120f0a00110001e2f5fe009b8daef85b4b5112dc3a5923e812ff00", 0x27) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") recvmmsg(r0, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) 18:55:18 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB='part=0x0000000000000007,force,uid=', @ANYRESHEX]) 18:55:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) 18:55:18 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x4995b042, 0xff, 0x5, 0x21d080000}, {0x3a, 0x0, 0x0, 0x3}, {0x0, 0x400, 0x0, 0x5}]}, 0x10) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000002) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x3a3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x3}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e1, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 18:55:18 executing program 3: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/validatetrans\x00', 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f00000001c0)={'system_u:object_r:tmpreaper_exec_t:s0', 0x20, 'system_u:object_r:watchdog_device_t:s0', 0x20, 0x0, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x87) [ 707.316439] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 707.354724] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 18:55:18 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) [ 707.365019] attempt to access beyond end of device [ 707.367516] hfsplus: invalid uid specified [ 707.379950] loop2: rw=2048, want=3, limit=1 [ 707.385584] hfsplus: unable to parse mount options [ 707.390450] hfsplus: unable to find HFS+ superblock 18:55:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) 18:55:18 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) [ 707.537657] attempt to access beyond end of device [ 707.547360] loop2: rw=2048, want=3, limit=1 [ 707.558864] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 707.572359] hfsplus: unable to find HFS+ superblock [ 707.578333] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 18:55:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) 18:55:18 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 18:55:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) 18:55:18 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) 18:55:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) [ 707.829331] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 707.840530] attempt to access beyond end of device [ 707.843957] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 707.853873] loop2: rw=2048, want=3, limit=1 [ 707.876398] hfsplus: unable to find HFS+ superblock 18:55:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) 18:55:18 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:18 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:18 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:18 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 708.119832] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 708.133451] attempt to access beyond end of device [ 708.140031] loop2: rw=2048, want=3, limit=1 [ 708.149936] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 708.160878] hfsplus: unable to find HFS+ superblock 18:55:19 executing program 3: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:19 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:19 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 18:55:19 executing program 5: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x4, 0x4) connect$caif(r0, &(0x7f0000000000)=@dbg, 0x18) 18:55:19 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) [ 708.412224] attempt to access beyond end of device [ 708.469995] loop2: rw=2048, want=3, limit=1 18:55:19 executing program 1: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) [ 708.517840] hfsplus: unable to find HFS+ superblock 18:55:19 executing program 5: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 1: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 5: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:19 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 1: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="090b000000000000000e04000000"], 0x1}, 0x1, 0xf0ffff}, 0x0) 18:55:20 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 2: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)) 18:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) fchmod(r0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x0, @rand_addr, 0x0, 0x2, 'ovf\x00', 0x2, 0x0, 0x3a}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) poll(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 18:55:20 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f00000005c0)='/dev/snd/controlC#\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00') 18:55:20 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="c5712dbd7000fddbdf25010000000c0002006c00000000000000f17a1d20090ab86d9b35a16e0d340919357c58e9610815e2dc641215a648eaa8b3e733c9110e8c0b852276280f9ca1d79827cec1d82c44b4cfafce32f665d6a5cdd559019beb77575a9d3b5bc30c5280a64b4db33541200b6e196d2102e4d61c90dacbec2e3624f144787f7b36fec4cc4f178ad4fbac45a276f35c3034c03cce0a2a604b92e6bc980a22139865a0ec48a7fdc61d5a08dcc31cc33f1c318f13d010d18d2120fb43c6859730714a2fc772393bd06b934673d0ec7c68c36e09b5a9e3c6359502f3fb5df91e7c9ac76c1f0d2a26cfa979e44d8fdcfa53d0ec38f33d764c9ee232a584ee9b0e6631964f16b4dc9a9602e36e81c1821c9b319ed5570ee4c0a6929af407655d22f0db528be7113d6463d5384e7b4c352c6d90a0d502fea45f3ed23de9d5d8e927122dfe75d47cad4ce3e0c297ac7c603ce76de9210bdd445048c1e38598174b0188c35f66357fca54600714d63402c28c28581452fd3aaa9549b539a3045baaea7f4c729347b0ddb53f04affd902449a4d30ce8e854616a996c02907e27c244b761661c31ce505f2dd4a557"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 0: socket$kcm(0x29, 0x2, 0x0) r0 = semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(r0, 0x4000000100003, 0x3, &(0x7f0000000080)=""/205) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f00000004c0)='./file0\x00', 0x8024, 0x6) renameat2(r1, &(0x7f0000000340)='./file0\x00', r1, &(0x7f0000000380)='./file1\x00', 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2000000000000, @ipv4={[], [], @loopback}, 0x2}, 0xffbb) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r4 = open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000040)={0x84, @local, 0x8000000000000000, 0x600, 'wrr\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r7 = fcntl$dupfd(r5, 0x406, r5) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000300)=0x7, 0x4) linkat(r4, &(0x7f00000003c0)='./file1\x00', r1, &(0x7f0000000440)='./file1\x00', 0x400) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r5, r5, &(0x7f00000000c0), 0x6) pselect6(0x40, &(0x7f0000000100)={0x3f, 0xfffffffffffffffc, 0x5, 0x200, 0x401, 0x2, 0x607153fe, 0x100000001}, &(0x7f0000000140)={0x5, 0x1, 0xc53, 0x401, 0x9, 0x8000000000002, 0xd75c, 0x6220}, &(0x7f0000000180)={0x2197, 0xbc, 0x40, 0x400, 0x3, 0x7}, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280)={0x2}, 0x8}) ioctl(r6, 0x800000000008982, &(0x7f0000000080)) signalfd4(r7, &(0x7f0000000480)={0x4}, 0x132, 0x80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/kvm\x00', 0x420002, 0x0) r8 = socket(0x10, 0x1, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000680)='/dev/urandom\x00', 0x1000040000, 0x0) 18:55:20 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) fchmod(r0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x0, @rand_addr, 0x0, 0x2, 'ovf\x00', 0x2, 0x0, 0x3a}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) poll(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 18:55:20 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) fchmod(r0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x0, @rand_addr, 0x0, 0x2, 'ovf\x00', 0x2, 0x0, 0x3a}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) poll(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 18:55:20 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) fchmod(r0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000004c0)={0x0, @rand_addr, 0x0, 0x2, 'ovf\x00', 0x2, 0x0, 0x3a}, 0x2c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) poll(0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 18:55:20 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 18:55:20 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:20 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') [ 710.242779] kauditd_printk_skb: 120 callbacks suppressed [ 710.242787] audit: type=1400 audit(1556650521.030:1665): avc: denied { create } for pid=25843 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:21 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:21 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) [ 710.363224] audit: type=1400 audit(1556650521.060:1666): avc: denied { create } for pid=25846 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') 18:55:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="c5712dbd7000fddbdf25010000000c0002006c00000000000000f17a1d20090ab86d9b35a16e0d340919357c58e9610815e2dc641215a648eaa8b3e733c9110e8c0b852276280f9ca1d79827cec1d82c44b4cfafce32f665d6a5cdd559019beb77575a9d3b5bc30c5280a64b4db33541200b6e196d2102e4d61c90dacbec2e3624f144787f7b36fec4cc4f178ad4fbac45a276f35c3034c03cce0a2a604b92e6bc980a22139865a0ec48a7fdc61d5a08dcc31cc33f1c318f13d010d18d2120fb43c6859730714a2fc772393bd06b934673d0ec7c68c36e09b5a9e3c6359502f3fb5df91e7c9ac76c1f0d2a26cfa979e44d8fdcfa53d0ec38f33d764c9ee232a584ee9b0e6631964f16b4dc9a9602e36e81c1821c9b319ed5570ee4c0a6929af407655d22f0db528be7113d6463d5384e7b4c352c6d90a0d502fea45f3ed23de9d5d8e927122dfe75d47cad4ce3e0c297ac7c603ce76de9210bdd445048c1e38598174b0188c35f66357fca54600714d63402c28c28581452fd3aaa9549b539a3045baaea7f4c729347b0ddb53f04affd902449a4d30ce8e854616a996c02907e27c244b761661c31ce505f2dd4a557"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) [ 710.525227] audit: type=1400 audit(1556650521.079:1667): avc: denied { write } for pid=25846 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') 18:55:21 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="c5712dbd7000fddbdf25010000000c0002006c00000000000000f17a1d20090ab86d9b35a16e0d340919357c58e9610815e2dc641215a648eaa8b3e733c9110e8c0b852276280f9ca1d79827cec1d82c44b4cfafce32f665d6a5cdd559019beb77575a9d3b5bc30c5280a64b4db33541200b6e196d2102e4d61c90dacbec2e3624f144787f7b36fec4cc4f178ad4fbac45a276f35c3034c03cce0a2a604b92e6bc980a22139865a0ec48a7fdc61d5a08dcc31cc33f1c318f13d010d18d2120fb43c6859730714a2fc772393bd06b934673d0ec7c68c36e09b5a9e3c6359502f3fb5df91e7c9ac76c1f0d2a26cfa979e44d8fdcfa53d0ec38f33d764c9ee232a584ee9b0e6631964f16b4dc9a9602e36e81c1821c9b319ed5570ee4c0a6929af407655d22f0db528be7113d6463d5384e7b4c352c6d90a0d502fea45f3ed23de9d5d8e927122dfe75d47cad4ce3e0c297ac7c603ce76de9210bdd445048c1e38598174b0188c35f66357fca54600714d63402c28c28581452fd3aaa9549b539a3045baaea7f4c729347b0ddb53f04affd902449a4d30ce8e854616a996c02907e27c244b761661c31ce505f2dd4a557"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) [ 710.622611] md: could not open unknown-block(1025,0). [ 710.629263] md: md_import_device returned -6 [ 710.659771] audit: type=1400 audit(1556650521.099:1669): avc: denied { create } for pid=25845 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') 18:55:21 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') 18:55:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) [ 710.833613] audit: type=1400 audit(1556650521.099:1668): avc: denied { read } for pid=25846 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') 18:55:21 executing program 1: getrandom(&(0x7f0000000000)=""/165, 0xa5, 0x3) 18:55:21 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0xff5d) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:55:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000380)='./file0\x00', 0x80000005) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) rmdir(&(0x7f0000000040)='./file0\x00') [ 711.058699] audit: type=1400 audit(1556650521.099:1670): avc: denied { write } for pid=25845 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:21 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) 18:55:21 executing program 1: getrandom(&(0x7f0000000000)=""/165, 0xa5, 0x3) 18:55:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r0, 0x80000000000, 0x0) [ 711.105221] audit: type=1400 audit(1556650521.109:1671): avc: denied { read } for pid=25845 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:22 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 18:55:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0xff5d) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:55:22 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000001b00)={0x0, 0x23, 0x1ff, &(0x7f0000001ac0)=0x200}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000100)=0xffffffff7fffffff) syz_open_dev$video(&(0x7f0000001cc0)='/dev/video#\x00', 0x100, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000002100)={0x4, 0x0, 0x701f, 0x2, 0x3, 0x2000000000003, 0x7fffffff, 0x1}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x290802, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000340)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) truncate(0x0, 0x3) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000000000), 0x10) preadv(r0, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/186, 0xba}, {&(0x7f00000004c0)=""/164, 0xa4}, {0x0}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/206, 0xce}, {&(0x7f0000001740)=""/203, 0xcb}, {&(0x7f0000001840)=""/150, 0x96}], 0x8, 0x0) tee(r1, r1, 0x0, 0x8) r3 = openat$md(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/md0\x00', 0x0, 0x0) r4 = add_key(&(0x7f0000001b40)='N,\x01\xb2@\xa7\xd0\x9c)\xf4qH\x15\xa2\xdb\x88P\x16\xc6\xcd\xc4^gg\x11V)\x8b\xbe\x9a\xe6\xa0\xf4\x89\x1cY\x1a0\xe2\x9ai\xdcD\xe0r#\xea#\xaa\x85R\xc8\xa7 \xed\xae-/\x80\x17\xd3\xc8)Q\xe4i\t\xa7', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xcffc) request_key(&(0x7f0000001a00)='rxrpc_s\x00', &(0x7f0000001a40)={'syz', 0x0}, &(0x7f0000001a80)='eth1\\+!eth0/@/\x00', r4) keyctl$clear(0x7, r4) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0xee8800000000000, 0x3}, {0x400, 0x80000000}, {0x4, 0x4}]}) write$UHID_DESTROY(r1, &(0x7f0000001700), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0x2d, 0xffffffffea3a758b, 0x100000000, 0x3}, 0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001bc0)={{{@in=@initdev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) ioctl$BLKPG(r3, 0x40140921, &(0x7f0000000080)={0x0, 0x401, 0x0, 0x0}) getpeername$ax25(r0, &(0x7f0000001680)={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @rose, @null, @null]}, &(0x7f0000000380)=0x48) syz_genetlink_get_family_id$nbd(&(0x7f00000019c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001d40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000001d00)={&(0x7f0000001f40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001ec0), &(0x7f0000001f00)=0x8) 18:55:22 executing program 1: getrandom(&(0x7f0000000000)=""/165, 0xa5, 0x3) 18:55:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) [ 711.225151] audit: type=1400 audit(1556650521.109:1672): avc: denied { read } for pid=25843 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) 18:55:22 executing program 1: getrandom(&(0x7f0000000000)=""/165, 0xa5, 0x3) 18:55:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 18:55:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0xff5d) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 18:55:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) read(r0, 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 18:55:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) [ 711.395620] audit: type=1400 audit(1556650521.278:1673): avc: denied { create } for pid=25861 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:22 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) 18:55:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) 18:55:22 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)) 18:55:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0xff5d) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 711.610777] audit: type=1400 audit(1556650521.288:1674): avc: denied { write } for pid=25861 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x19) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 18:55:22 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f00000001c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x44b}, 0x10161) 18:55:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x2}, 0x10) 18:55:22 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000289000)={0x0, 0x0, &(0x7f0000058000)={&(0x7f000023f000)=ANY=[@ANYBLOB="840008000000000000bd7000ffffffff0000fffc0c00000000000000000000005b659a62290ffc380c2dbfdc5e9f13e1a04810d464fbc3f4c1b4e2bf501fb1bb949869c2984d914d9f04005e4fcd4dd3050bc1700612dbc3080c91745fa158cf0d70309f7f1969136edfd73294c0356675ffff000044f2a432a15b4ce56aa166b5000d"], 0x83}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) 18:55:23 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) syz_execute_func(&(0x7f0000000000)="951cf50f058520d2f8071166460f6d30298f17955bf95bc422d5a634ae2665643e36660fe8780066f66d220ff338df3e420fc5e8cd5466470f18d96641790f381dd0d0fc65660f79ea0f6eba0dfe8cc17373d9e543f500000fbfcec461fa5b1c12f3420861ff8171a38a6ebb577426a501c4740f2d439600004499e2793438c461205ffbf2400ff50a0f3804830a000000") 18:55:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x2}, 0x10) 18:55:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000340), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000000023) fcntl$setstatus(r0, 0x4, 0x427ff) 18:55:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000004000), 0xfffffee9) read$FUSE(r0, &(0x7f0000003000), 0x6ab) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)) write$FUSE_DIRENT(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000000018000000000000000000000000000b00000000000000656d316e6f646576f16d3100000000000000000000000000000000000000000001000000000000002c000000000000000000000000000000000000000000000033000000000000002b73797374656dcc63707573654b0667726f7570246367726f75701500000000"], 0x90) 18:55:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 18:55:23 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) syz_execute_func(&(0x7f0000000000)="951cf50f058520d2f8071166460f6d30298f17955bf95bc422d5a634ae2665643e36660fe8780066f66d220ff338df3e420fc5e8cd5466470f18d96641790f381dd0d0fc65660f79ea0f6eba0dfe8cc17373d9e543f500000fbfcec461fa5b1c12f3420861ff8171a38a6ebb577426a501c4740f2d439600004499e2793438c461205ffbf2400ff50a0f3804830a000000") 18:55:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 18:55:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x2}, 0x10) 18:55:23 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) syz_execute_func(&(0x7f0000000000)="951cf50f058520d2f8071166460f6d30298f17955bf95bc422d5a634ae2665643e36660fe8780066f66d220ff338df3e420fc5e8cd5466470f18d96641790f381dd0d0fc65660f79ea0f6eba0dfe8cc17373d9e543f500000fbfcec461fa5b1c12f3420861ff8171a38a6ebb577426a501c4740f2d439600004499e2793438c461205ffbf2400ff50a0f3804830a000000") 18:55:23 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2c) syz_execute_func(&(0x7f0000000000)="951cf50f058520d2f8071166460f6d30298f17955bf95bc422d5a634ae2665643e36660fe8780066f66d220ff338df3e420fc5e8cd5466470f18d96641790f381dd0d0fc65660f79ea0f6eba0dfe8cc17373d9e543f500000fbfcec461fa5b1c12f3420861ff8171a38a6ebb577426a501c4740f2d439600004499e2793438c461205ffbf2400ff50a0f3804830a000000") 18:55:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7d8bc5d4a459425f8c64a09bcd1c9d4c16b83a377a59767eaa929ee30cd287f29505b0d4b66c849d0526cd22b8581d763ad3c134c606a484f2add056a864ac875b38535c3b70876c1e431bbceed98f580492a9106e438e730d009fb502265a78eadd3dd2f37ffd8732f832b7682854180b8d64e2a44abfd5b6eb0d2a3ed78ef8bd2d945ca621544db3c182b4be54675a31d8f6aa9463db96ce2615f2f0ba56e7ac04a32bf864dbba4ea3d9ec3ec5795237317494482e2f99ac188bb06ee16c80e123d597169bdd74921297e246eb5b5f5db7613200f362d6535f904480f0a7adaf2b590da45a85b0ebce1625528d67db84661758d5b0d251b9183b7520b382133badbe5f71f0fa86bc24e56fb16329de6dbaade9c5f0cb2a85e28396c926408704d4b5da7a45ffd9"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:23 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x2}, 0x10) 18:55:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000340), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000000023) fcntl$setstatus(r0, 0x4, 0x427ff) 18:55:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 18:55:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7d8bc5d4a459425f8c64a09bcd1c9d4c16b83a377a59767eaa929ee30cd287f29505b0d4b66c849d0526cd22b8581d763ad3c134c606a484f2add056a864ac875b38535c3b70876c1e431bbceed98f580492a9106e438e730d009fb502265a78eadd3dd2f37ffd8732f832b7682854180b8d64e2a44abfd5b6eb0d2a3ed78ef8bd2d945ca621544db3c182b4be54675a31d8f6aa9463db96ce2615f2f0ba56e7ac04a32bf864dbba4ea3d9ec3ec5795237317494482e2f99ac188bb06ee16c80e123d597169bdd74921297e246eb5b5f5db7613200f362d6535f904480f0a7adaf2b590da45a85b0ebce1625528d67db84661758d5b0d251b9183b7520b382133badbe5f71f0fa86bc24e56fb16329de6dbaade9c5f0cb2a85e28396c926408704d4b5da7a45ffd9"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') [ 715.471453] kauditd_printk_skb: 89 callbacks suppressed [ 715.471461] audit: type=1804 audit(1556650526.236:1764): pid=26028 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="bus" dev="sda1" ino=17569 res=1 18:55:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) [ 715.763285] audit: type=1400 audit(1556650526.246:1765): avc: denied { map } for pid=26029 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) [ 716.004067] audit: type=1400 audit(1556650526.266:1766): avc: denied { map } for pid=26026 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x8200) lseek(r0, 0x0, 0x2) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x128) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000140), 0x4) sendfile(r1, r2, &(0x7f0000000100), 0x401) fcntl$setstatus(r0, 0x4, 0x0) sendfile(r0, r2, &(0x7f0000002780), 0x4008000fffffffe) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x4, 0x9}, 0x14) ftruncate(r1, 0x0) 18:55:27 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x11a) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ftruncate(r2, 0x2007fff) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7}, 0x7) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 716.242511] audit: type=1400 audit(1556650526.286:1767): avc: denied { map } for pid=26029 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') [ 716.410112] audit: type=1804 audit(1556650526.286:1768): pid=26019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="bus" dev="sda1" ino=17569 res=1 [ 716.459295] audit: type=1804 audit(1556650526.326:1769): pid=26020 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir983577998/syzkaller.uhNMQK/376/bus" dev="sda1" ino=17585 res=1 [ 716.487439] audit: type=1804 audit(1556650526.345:1770): pid=26021 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="bus" dev="sda1" ino=17377 res=1 [ 716.511505] audit: type=1400 audit(1556650526.415:1771): avc: denied { create } for pid=26013 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 716.536237] audit: type=1400 audit(1556650526.415:1772): avc: denied { write } for pid=26013 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 716.645458] audit: type=1400 audit(1556650526.425:1773): avc: denied { read } for pid=26013 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000340), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000000023) fcntl$setstatus(r0, 0x4, 0x427ff) 18:55:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4047, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/24) 18:55:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="a4200000009e7e428e21db00536dcb219f56c8033ac0e7de1177c68e78"], 0x1d) perf_event_open(&(0x7f0000000800)={0x1, 0x306, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000100)='./file1\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 18:55:29 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30}, 0x30) 18:55:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) connect$vsock_dgram(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 18:55:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4000000000020001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4047, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/24) 18:55:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 18:55:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4047, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/24) 18:55:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 18:55:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4047, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000000)=""/24) 18:55:29 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 18:55:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000002c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000340), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x80000000023) fcntl$setstatus(r0, 0x4, 0x427ff) 18:55:32 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) socket$caif_stream(0x25, 0x1, 0x0) pipe2$9p(&(0x7f0000000000), 0x800) syz_execute_func(&(0x7f0000000340)="c462653dce0fbdc52ecd8080000cc4e1ed64338a20d0d0f0408392300000002a6626f243e0ff0070e4c653fb0f450fbd27a95f5744be3c3b6446ddcb8f48508e307b8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f096161787896c401fe5ff666410fd7cae1b1c402010804f466400f38f556f6892a009f") 18:55:32 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xfffff000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:55:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) connect$vsock_dgram(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 18:55:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4000000000020001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 18:55:32 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xfffff000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:55:32 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xfffff000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:55:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000080)='127.0.0.0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=tcp,', {'port'}}) 18:55:32 executing program 3: syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x6, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xfffff000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 18:55:32 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000f1fff6)='/dev/vcs#\x00', 0x0, 0x0) mprotect(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x3) 18:55:32 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000f1fff6)='/dev/vcs#\x00', 0x0, 0x0) mprotect(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x3) [ 722.485459] kauditd_printk_skb: 34 callbacks suppressed [ 722.485467] audit: type=1400 audit(1556650533.198:1808): avc: denied { map } for pid=26137 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 722.517920] 9pnet: p9_fd_create_tcp (26127): problem connecting socket to 127.0.0.0 [ 722.521487] 9pnet: p9_fd_create_tcp (26138): problem connecting socket to 127.0.0.0 18:55:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) connect$vsock_dgram(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 18:55:35 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000f1fff6)='/dev/vcs#\x00', 0x0, 0x0) mprotect(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x3) 18:55:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x8108551b, &(0x7f0000000140)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {}, 0x2}) 18:55:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4000000000020001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5c}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 18:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, 0x0) 18:55:35 executing program 3: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0xa, 0x11, r0, 0x0) syz_open_dev$vcsn(&(0x7f0000f1fff6)='/dev/vcs#\x00', 0x0, 0x0) mprotect(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x3) 18:55:35 executing program 0: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x60ef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x6, 0xffffffffffffffdf) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801}) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x474, 0xf9, 0x1ff}}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) 18:55:35 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 18:55:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5c}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 18:55:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) dup2(r1, r0) [ 724.811755] 9pnet: Insufficient options for proto=fd 18:55:35 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 724.911525] audit: type=1400 audit(1556650535.598:1809): avc: denied { map } for pid=26166 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 725.003547] 9pnet: Insufficient options for proto=fd [ 725.005562] audit: type=1400 audit(1556650535.657:1810): avc: denied { map } for pid=26171 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 725.058983] audit: type=1400 audit(1556650535.677:1811): avc: denied { map } for pid=26171 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:36 executing program 3: modify_ldt$write(0x1, &(0x7f00007a7ff0)={0xd1f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 18:55:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) connect$vsock_dgram(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 18:55:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) recvmmsg(r0, &(0x7f00000003c0)=[{{0x0, 0x4, 0x0, 0x0, 0x0, 0x4000}}], 0x7fffffff00000024, 0x3f00, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 18:55:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4000000000020001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xb3c}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:36 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 18:55:36 executing program 3: modify_ldt$write(0x1, &(0x7f00007a7ff0)={0xd1f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) 18:55:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5c}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 18:55:36 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x121002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, 0xfffffffffffffffd) 18:55:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x9, @ipv4=@rand_addr=0xa000000}]}, 0x1c}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 725.595422] audit: type=1400 audit(1556650536.272:1812): avc: denied { map } for pid=26186 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:36 executing program 3: modify_ldt$write(0x1, &(0x7f00007a7ff0)={0xd1f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) [ 725.647015] audit: type=1400 audit(1556650536.272:1813): avc: denied { map } for pid=26186 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 725.685078] 9pnet: Insufficient options for proto=fd 18:55:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x5c}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) [ 725.690477] audit: type=1400 audit(1556650536.362:1814): avc: denied { create } for pid=26193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:36 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) [ 725.736248] audit: type=1400 audit(1556650536.371:1815): avc: denied { write } for pid=26193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:55:36 executing program 3: modify_ldt$write(0x1, &(0x7f00007a7ff0)={0xd1f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) [ 725.797719] audit: type=1400 audit(1556650536.471:1816): avc: denied { create } for pid=26193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 725.907099] 9pnet: Insufficient options for proto=fd [ 725.933047] audit: type=1400 audit(1556650536.609:1817): avc: denied { map } for pid=26208 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x9, @ipv4=@rand_addr=0xa000000}]}, 0x1c}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 18:55:36 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 18:55:36 executing program 5: mmap(&(0x7f0000ad2000/0x1000)=nil, 0x1000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 18:55:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x3}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x400000000ef) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) 18:55:37 executing program 5: mmap(&(0x7f0000ad2000/0x1000)=nil, 0x1000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 18:55:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x400000000ef) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) 18:55:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x9, @ipv4=@rand_addr=0xa000000}]}, 0x1c}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 18:55:37 executing program 5: mmap(&(0x7f0000ad2000/0x1000)=nil, 0x1000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 18:55:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x400000000ef) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) [ 726.728884] protocol 88fb is buggy, dev hsr_slave_0 [ 726.734057] protocol 88fb is buggy, dev hsr_slave_1 18:55:37 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 18:55:37 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x400000000ef) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000003000)={0xa, 0x0, 0x0, @loopback, 0x2}, 0x1c) [ 726.880144] protocol 88fb is buggy, dev hsr_slave_0 [ 726.880181] protocol 88fb is buggy, dev hsr_slave_0 [ 726.885292] protocol 88fb is buggy, dev hsr_slave_1 [ 726.890401] protocol 88fb is buggy, dev hsr_slave_1 18:55:37 executing program 5: mmap(&(0x7f0000ad2000/0x1000)=nil, 0x1000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x9, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) [ 727.042179] protocol 88fb is buggy, dev hsr_slave_0 [ 727.047802] protocol 88fb is buggy, dev hsr_slave_1 18:55:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x3}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:55:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:37 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 18:55:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0x9, @ipv4=@rand_addr=0xa000000}]}, 0x1c}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 18:55:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:38 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') 18:55:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) [ 727.820222] kauditd_printk_skb: 42 callbacks suppressed [ 727.820229] audit: type=1400 audit(1556650538.464:1860): avc: denied { map } for pid=26293 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.080937] audit: type=1400 audit(1556650538.484:1861): avc: denied { map } for pid=26293 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.171615] protocol 88fb is buggy, dev hsr_slave_0 [ 728.177100] protocol 88fb is buggy, dev hsr_slave_1 [ 728.212203] audit: type=1400 audit(1556650538.514:1862): avc: denied { map } for pid=26293 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.258627] audit: type=1400 audit(1556650538.514:1863): avc: denied { map } for pid=26293 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.289352] audit: type=1400 audit(1556650538.543:1864): avc: denied { map } for pid=26296 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.312620] audit: type=1400 audit(1556650538.573:1865): avc: denied { map } for pid=26296 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x3}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 18:55:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000005c0), 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) getdents(r0, &(0x7f0000000000)=""/48, 0x30) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:55:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f00000002c0)={0x40, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42803) tkill(r3, 0x1a) [ 728.339837] audit: type=1400 audit(1556650538.583:1866): avc: denied { map } for pid=26296 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.365088] audit: type=1400 audit(1556650538.603:1867): avc: denied { map } for pid=26302 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.403463] audit: type=1400 audit(1556650538.603:1868): avc: denied { map } for pid=26302 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) 18:55:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x62040, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x2001, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) [ 728.618725] audit: type=1400 audit(1556650538.613:1869): avc: denied { map } for pid=26302 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.736895] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 728.778766] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:55:39 executing program 0: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x40000002, 0x0) [ 728.860100] 8021q: adding VLAN 0 to HW filter on device team0 18:55:39 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000000)="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") 18:55:39 executing program 0: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x40000002, 0x0) 18:55:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 18:55:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x3}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 729.492405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:55:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000005c0), 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) getdents(r0, &(0x7f0000000000)=""/48, 0x30) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:55:40 executing program 0: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x40000002, 0x0) 18:55:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4004550c, &(0x7f0000001200)) 18:55:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) [ 729.586917] vhci_hcd: invalid port number 255 [ 729.591689] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 729.608300] vhci_hcd: invalid port number 255 [ 729.616193] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 729.748119] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:55:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4004550c, &(0x7f0000001200)) 18:55:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000005c0), 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) getdents(r0, &(0x7f0000000000)=""/48, 0x30) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:55:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 18:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r2 = gettid() ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 18:55:42 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 18:55:42 executing program 0: clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) wait4(0x0, &(0x7f00000002c0), 0x40000002, 0x0) [ 731.476958] vhci_hcd: invalid port number 255 18:55:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\xc84\x03\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) 18:55:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 18:55:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4004550c, &(0x7f0000001200)) [ 731.503109] vhci_hcd: default hub control req: feff vffff i00ff l65535 [ 731.541972] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 18:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x16, 0x0, 0x0) dup3(r3, r2, 0x0) close(r1) 18:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:55:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000005c0), 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) getdents(r0, &(0x7f0000000000)=""/48, 0x30) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000100), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 18:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r2 = gettid() ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 18:55:42 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000006, 0x1000000000000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x740000, 0xffffffff7ff0bdbe}) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x4004550c, &(0x7f0000001200)) [ 731.687766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 731.707157] vhci_hcd: invalid port number 255 [ 731.712036] vhci_hcd: default hub control req: feff vffff i00ff l65535 18:55:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x1a, 0x0, &(0x7f0000000140)) close(r2) close(r1) 18:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x16, 0x0, 0x0) dup3(r3, r2, 0x0) close(r1) 18:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r2 = gettid() ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 18:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 731.907250] vhci_hcd: invalid port number 255 [ 731.916823] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 731.920437] vhci_hcd: default hub control req: feff vffff i00ff l65535 18:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r2 = gettid() ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 18:55:42 executing program 5: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 731.981467] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 18:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x16, 0x0, 0x0) dup3(r3, r2, 0x0) close(r1) 18:55:42 executing program 1: r0 = socket$packet(0x11, 0x2000000000002, 0x300) set_mempolicy(0x3, &(0x7f0000000240)=0x6697, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 18:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 732.095977] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 18:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 18:55:42 executing program 5: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 732.181222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 732.198910] xprt_adjust_timeout: rq_timeout = 0! 18:55:42 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bc070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe050400080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 732.233088] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 18:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x16, 0x0, 0x0) dup3(r3, r2, 0x0) close(r1) 18:55:43 executing program 0: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 732.365677] net_ratelimit: 14 callbacks suppressed [ 732.365682] protocol 88fb is buggy, dev hsr_slave_0 [ 732.375910] protocol 88fb is buggy, dev hsr_slave_1 [ 732.381011] protocol 88fb is buggy, dev hsr_slave_0 [ 732.386099] protocol 88fb is buggy, dev hsr_slave_1 [ 732.433016] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 732.462438] xprt_adjust_timeout: rq_timeout = 0! 18:55:43 executing program 5: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:43 executing program 2: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 732.491603] xprt_adjust_timeout: rq_timeout = 0! 18:55:43 executing program 4: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:43 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 732.759402] xprt_adjust_timeout: rq_timeout = 0! [ 732.909384] kauditd_printk_skb: 22 callbacks suppressed [ 732.909392] audit: type=1400 audit(1556650543.522:1892): avc: denied { map } for pid=26482 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.920302] xprt_adjust_timeout: rq_timeout = 0! [ 732.947924] xprt_adjust_timeout: rq_timeout = 0! [ 733.011038] protocol 88fb is buggy, dev hsr_slave_0 [ 733.016317] protocol 88fb is buggy, dev hsr_slave_1 [ 733.098583] audit: type=1400 audit(1556650543.561:1893): avc: denied { map } for pid=26482 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.138096] audit: type=1400 audit(1556650543.601:1894): avc: denied { map } for pid=26491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.165777] audit: type=1400 audit(1556650543.690:1895): avc: denied { map } for pid=26496 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.172387] protocol 88fb is buggy, dev hsr_slave_0 [ 733.188102] protocol 88fb is buggy, dev hsr_slave_0 [ 733.193146] protocol 88fb is buggy, dev hsr_slave_1 [ 733.198132] protocol 88fb is buggy, dev hsr_slave_1 [ 733.213548] audit: type=1400 audit(1556650543.710:1896): avc: denied { map } for pid=26496 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.242006] audit: type=1400 audit(1556650543.710:1897): avc: denied { map } for pid=26497 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.279889] audit: type=1400 audit(1556650543.750:1898): avc: denied { map } for pid=26499 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.307713] audit: type=1400 audit(1556650543.760:1899): avc: denied { map } for pid=26498 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.333912] audit: type=1400 audit(1556650543.760:1900): avc: denied { map } for pid=26499 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:44 executing program 1: r0 = socket$packet(0x11, 0x2000000000002, 0x300) set_mempolicy(0x3, &(0x7f0000000240)=0x6697, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 18:55:44 executing program 0: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 5: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 2: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 4: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 734.032503] xprt_adjust_timeout: rq_timeout = 0! 18:55:44 executing program 2: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) [ 734.077176] audit: type=1400 audit(1556650544.682:1901): avc: denied { map } for pid=26519 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.142803] xprt_adjust_timeout: rq_timeout = 0! [ 734.148151] overlayfs: invalid redirect (./file0) [ 734.171506] xprt_adjust_timeout: rq_timeout = 0! [ 734.216260] xprt_adjust_timeout: rq_timeout = 0! [ 734.241697] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 18:55:44 executing program 4: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:44 executing program 0: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x209, 0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x8, 0x0, 0x9, 0xa47f201, 0x0, 0x4, 0x3, 0x10001, 0x84f, 0x8, 0x6, 0x0, 0x8, 0x7, 0x5, 0x5, 0x1f, 0x1f, 0x7fff, 0x9, 0x0, 0xd0, 0x8000000000000000, 0x9, 0x800, 0x0, 0x9, 0x8, 0x800, 0x5, 0xa188, 0x0, 0x200000000, 0x2, @perf_bp={0x0, 0x8}, 0x4000, 0x8, 0xffff, 0x4, 0xd1, 0x8f, 0x1}, r1, 0x3, r0, 0x8) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000001c0)='./file1/file0\x00', 0x6, 0x0, 0x0, 0x400, &(0x7f0000000380)={[{@usrjquota_file='usrjquota=syz'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}], [{@hash='hash'}, {@hash='hash'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ']bdev'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) 18:55:45 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 18:55:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) [ 734.557244] 9pnet: Insufficient options for proto=fd [ 734.602527] xprt_adjust_timeout: rq_timeout = 0! [ 734.658802] overlayfs: invalid redirect (./file0) 18:55:46 executing program 1: r0 = socket$packet(0x11, 0x2000000000002, 0x300) set_mempolicy(0x3, &(0x7f0000000240)=0x6697, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 18:55:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) 18:55:46 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 18:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) 18:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000180)=[{0x2000000080}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) 18:55:46 executing program 0: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{&(0x7f0000000180)=@ethernet={0x6}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0xfdf4, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 18:55:46 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 18:55:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) 18:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000180)=[{0x2000000080}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) [ 735.478595] 9pnet: Insufficient options for proto=fd [ 735.522727] overlayfs: invalid redirect (./file0) 18:55:46 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) 18:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000180)=[{0x2000000080}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) [ 735.586534] 9pnet: Insufficient options for proto=fd [ 735.747280] overlayfs: invalid redirect (./file0) 18:55:47 executing program 1: r0 = socket$packet(0x11, 0x2000000000002, 0x300) set_mempolicy(0x3, &(0x7f0000000240)=0x6697, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) 18:55:47 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}}) 18:55:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) stat(&(0x7f0000000440)='./file0/file0\x00', 0x0) 18:55:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000180)=[{0x2000000080}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) 18:55:47 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) [ 736.761904] 9pnet: Insufficient options for proto=fd 18:55:47 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:47 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) [ 737.528531] net_ratelimit: 14 callbacks suppressed [ 737.528536] protocol 88fb is buggy, dev hsr_slave_0 [ 737.538744] protocol 88fb is buggy, dev hsr_slave_1 18:55:48 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 5: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x4b, 0xe}}) close(r2) close(r1) 18:55:48 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:48 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.SMACK64MMAP\x00', &(0x7f0000000400)='net/ip_mr_cache\x00', 0x10, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_mr_cache\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) request_key(0x0, &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xfffffffffffffffa) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r1, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) pipe(0x0) 18:55:48 executing program 0: r0 = socket$unix(0x1, 0x4000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r0) close(r2) [ 738.285045] sched: DL replenish lagged too much 18:55:48 executing program 2: unshare(0x8000000) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000180)={0x0, 0x8140}) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000001600)=""/4096, 0x2}], 0x10000000000000e5, 0x0) 18:55:48 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x2}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)="94963e93536c94fa0f57158f965246d477968ecc5a32d3d4dce27317c1942d60a4a3b2faf617693279e27c7340ec1c6fc6ec61257ba7802ba39ee71027ac02b0173dc4020eae13ec211507c2136747b7f4805d4c0848f6c4a370bd20c9ed4f32bddeb48b743aca0953d1f09e5d8d930749eec0807b36e47919db0f6a9d2489", 0x7f) write$rfkill(r2, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x1, 0x1}, 0x8) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000500)=""/205, 0xcd) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff49, &(0x7f0000000040)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x1df}}, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x8, {0xec}}, 0x18) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, 0x45c) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) write$input_event(r3, 0x0, 0x0) 18:55:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) [ 738.368492] kauditd_printk_skb: 28 callbacks suppressed [ 738.368501] audit: type=1400 audit(1556650548.946:1930): avc: denied { map } for pid=26642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x4b, 0xe}}) close(r2) close(r1) [ 738.420041] audit: type=1400 audit(1556650548.976:1931): avc: denied { map } for pid=26642 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:49 executing program 2: unshare(0x8000000) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000180)={0x0, 0x8140}) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000001600)=""/4096, 0x2}], 0x10000000000000e5, 0x0) 18:55:49 executing program 0: r0 = socket$unix(0x1, 0x4000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r0) close(r2) 18:55:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x2}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)="94963e93536c94fa0f57158f965246d477968ecc5a32d3d4dce27317c1942d60a4a3b2faf617693279e27c7340ec1c6fc6ec61257ba7802ba39ee71027ac02b0173dc4020eae13ec211507c2136747b7f4805d4c0848f6c4a370bd20c9ed4f32bddeb48b743aca0953d1f09e5d8d930749eec0807b36e47919db0f6a9d2489", 0x7f) write$rfkill(r2, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x1, 0x1}, 0x8) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000500)=""/205, 0xcd) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff49, &(0x7f0000000040)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x1df}}, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x8, {0xec}}, 0x18) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, 0x45c) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) write$input_event(r3, 0x0, 0x0) [ 738.523742] audit: type=1400 audit(1556650548.976:1932): avc: denied { map } for pid=26642 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x4b, 0xe}}) close(r2) close(r1) 18:55:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) [ 738.625299] audit: type=1400 audit(1556650548.976:1933): avc: denied { map } for pid=26642 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.651597] audit: type=1400 audit(1556650548.986:1934): avc: denied { map } for pid=26642 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.748055] audit: type=1400 audit(1556650549.026:1935): avc: denied { create } for pid=26646 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 738.778750] audit: type=1400 audit(1556650549.035:1936): avc: denied { map } for pid=26646 comm="syz-executor.4" path="socket:[101725]" dev="sockfs" ino=101725 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 738.817441] audit: type=1400 audit(1556650549.055:1938): avc: denied { map } for pid=26654 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.840450] audit: type=1400 audit(1556650549.055:1937): avc: denied { read } for pid=26646 comm="syz-executor.4" path="socket:[101725]" dev="sockfs" ino=101725 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 738.869500] audit: type=1400 audit(1556650549.085:1940): avc: denied { map } for pid=26656 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.081545] IPVS: ftp: loaded support on port[0] = 21 18:55:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:49 executing program 0: r0 = socket$unix(0x1, 0x4000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r0) close(r2) 18:55:49 executing program 2: unshare(0x8000000) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000180)={0x0, 0x8140}) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000001600)=""/4096, 0x2}], 0x10000000000000e5, 0x0) 18:55:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:49 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x2}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)="94963e93536c94fa0f57158f965246d477968ecc5a32d3d4dce27317c1942d60a4a3b2faf617693279e27c7340ec1c6fc6ec61257ba7802ba39ee71027ac02b0173dc4020eae13ec211507c2136747b7f4805d4c0848f6c4a370bd20c9ed4f32bddeb48b743aca0953d1f09e5d8d930749eec0807b36e47919db0f6a9d2489", 0x7f) write$rfkill(r2, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x1, 0x1}, 0x8) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000500)=""/205, 0xcd) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff49, &(0x7f0000000040)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x1df}}, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x8, {0xec}}, 0x18) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, 0x45c) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) write$input_event(r3, 0x0, 0x0) 18:55:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x4b, 0xe}}) close(r2) close(r1) 18:55:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x208000, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x2}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000240)="94963e93536c94fa0f57158f965246d477968ecc5a32d3d4dce27317c1942d60a4a3b2faf617693279e27c7340ec1c6fc6ec61257ba7802ba39ee71027ac02b0173dc4020eae13ec211507c2136747b7f4805d4c0848f6c4a370bd20c9ed4f32bddeb48b743aca0953d1f09e5d8d930749eec0807b36e47919db0f6a9d2489", 0x7f) write$rfkill(r2, &(0x7f00000001c0)={0x0, 0x3, 0x2, 0x1, 0x1}, 0x8) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000500)=""/205, 0xcd) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff49, &(0x7f0000000040)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x1df}}, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000180)={0x18, 0xfffffffffffffffe, 0x8, {0xec}}, 0x18) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff]}, 0x45c) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) write$input_event(r3, 0x0, 0x0) 18:55:50 executing program 2: unshare(0x8000000) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000180)={0x0, 0x8140}) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000001600)=""/4096, 0x2}], 0x10000000000000e5, 0x0) 18:55:50 executing program 0: r0 = socket$unix(0x1, 0x4000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000780)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r0) close(r2) 18:55:50 executing program 4: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup3(r1, r0, 0x0) 18:55:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:50 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000080), 0xe) shutdown(r0, 0x0) 18:55:50 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 18:55:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:51 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0), 0x0, 0x0, 0x0) 18:55:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x2000001, 0x400100000002132, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) futex(&(0x7f0000000100), 0x86, 0x0, 0x0, 0x0, 0x0) 18:55:51 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x71a}) mq_timedreceive(r0, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, &(0x7f0000000380)) 18:55:51 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100000062102) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x27ffb) sendfile(r1, r2, 0x0, 0x8000fffffffc) 18:55:51 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x9}, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 18:55:51 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1f, 0x4000) 18:55:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x0, 0x10, 0x9}, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) 18:55:51 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x71a}) mq_timedreceive(r0, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, &(0x7f0000000380)) 18:55:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000005c0)={[], [{@measure='measure'}, {@context={'context', 0x3d, 'unconfined_u'}}]}) 18:55:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)={0x1f, 0x0, 0x10000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@random={'trusted.', 'lo-!self)!cgroupmime_type\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x30, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000001840)={0x53, 0x0, 0xa, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001740)="27d16347a54151f1908e", 0x0, 0x8c, 0x31, 0x2, 0x0}) unshare(0x40000000) 18:55:51 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x9}, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 742.530113] IPVS: ftp: loaded support on port[0] = 21 18:55:53 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x9}, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 18:55:53 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x71a}) mq_timedreceive(r0, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, &(0x7f0000000380)) 18:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x81}, {0x6, 0x0, 0x0, 0x50000}]}) 18:55:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") getpgid(0xffffffffffffffff) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:55:53 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = dup(r0) write$UHID_DESTROY(r1, 0x0, 0x0) 18:55:53 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x9}, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 18:55:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") getpgid(0xffffffffffffffff) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:55:53 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x71a}) mq_timedreceive(r0, &(0x7f00000021c0)=""/4096, 0x1000, 0x0, &(0x7f0000000380)) 18:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x81}, {0x6, 0x0, 0x0, 0x50000}]}) 18:55:53 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") getpgid(0xffffffffffffffff) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:55:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x81}, {0x6, 0x0, 0x0, 0x50000}]}) 18:55:53 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 743.440634] kauditd_printk_skb: 87 callbacks suppressed [ 743.440643] audit: type=1400 audit(1556650553.974:2027): avc: denied { map } for pid=26821 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:54 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bc070") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000300)={0x2, &(0x7f00000002c0)=[{0x81}, {0x6, 0x0, 0x0, 0x50000}]}) [ 743.554354] audit: type=1400 audit(1556650554.024:2028): avc: denied { syslog } for pid=26819 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:55:54 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="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") getpgid(0xffffffffffffffff) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:55:54 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 743.689422] audit: type=1400 audit(1556650554.212:2029): avc: denied { map } for pid=26835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:54 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:54 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:54 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:54 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 743.844388] audit: type=1400 audit(1556650554.252:2030): avc: denied { map } for pid=26835 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) 18:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x2000000004a26, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x350) recvmsg(r1, &(0x7f0000000080)={&(0x7f00000002c0)=@nl=@proc, 0x3, 0x0}, 0x2000) [ 744.011253] audit: type=1400 audit(1556650554.291:2031): avc: denied { syslog } for pid=26836 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:55:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newspdinfo={0x30, 0x24, 0x1, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0xffffffffffffffff, 0x0, 0x0, @in6=@loopback}}]}, 0x30}, 0x8}, 0x0) 18:55:54 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x510, 0x70bd2d, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x40000) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sigaltstack(&(0x7f000032f000/0x3000)=nil, &(0x7f00000002c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000}) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x4, 0x200000) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="210403006035e4d1c908fe80020000007b6071268ea528b2c7766ee3a4f30dd7a9263f9f19a4347eedf9279055b4eb46cc7d379c3454dd67900fe319415de83bdb37b2db0829a4ffc4828313d4e8bb7ce8c0dd5b8cbb8724204f9551b9427732e02131201b76bd8f0adc9c212cab60f2ba0880fbc7c2"], 0x1) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 18:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x2000000004a26, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x350) recvmsg(r1, &(0x7f0000000080)={&(0x7f00000002c0)=@nl=@proc, 0x3, 0x0}, 0x2000) 18:55:54 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 744.151806] audit: type=1400 audit(1556650554.351:2032): avc: denied { syslog } for pid=26836 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:55:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) 18:55:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newspdinfo={0x30, 0x24, 0x1, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0xffffffffffffffff, 0x0, 0x0, @in6=@loopback}}]}, 0x30}, 0x8}, 0x0) 18:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x2000000004a26, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x350) recvmsg(r1, &(0x7f0000000080)={&(0x7f00000002c0)=@nl=@proc, 0x3, 0x0}, 0x2000) [ 744.311830] audit: type=1400 audit(1556650554.767:2033): avc: denied { map } for pid=26872 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.492283] audit: type=1400 audit(1556650555.015:2034): avc: denied { map } for pid=26883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.567670] audit: type=1400 audit(1556650555.045:2035): avc: denied { map } for pid=26883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.650915] audit: type=1400 audit(1556650555.055:2036): avc: denied { map } for pid=26883 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:55 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x2000000004a26, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000100), 0x350) recvmsg(r1, &(0x7f0000000080)={&(0x7f00000002c0)=@nl=@proc, 0x3, 0x0}, 0x2000) 18:55:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newspdinfo={0x30, 0x24, 0x1, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0xffffffffffffffff, 0x0, 0x0, @in6=@loopback}}]}, 0x30}, 0x8}, 0x0) 18:55:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) 18:55:55 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x800000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(0x0, &(0x7f0000000780)={'syz', 0x2}, &(0x7f00000001c0)='vboxnet1\x00', 0xfffffffffffffffb) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, &(0x7f0000000100)=""/68) pipe2$9p(&(0x7f0000000200), 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TCSBRKP(r0, 0x5425, 0x7) socket$inet(0x10, 0x3, 0xc) lstat(0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 18:55:55 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x4a, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f00000000c0)={0x40000000003, 0x0, 0x400000, 0x0, 0x10020000008, 0x0}, 0x2c) 18:55:55 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newspdinfo={0x30, 0x24, 0x1, 0x0, 0x0, 0x0, [@encap={0x1c, 0x4, {0xffffffffffffffff, 0x0, 0x0, @in6=@loopback}}]}, 0x30}, 0x8}, 0x0) 18:55:55 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:55 executing program 5: accept$alg(0xffffffffffffff9c, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000080)="0adc1f123c123d319bd070") sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 18:55:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) 18:55:55 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) read(r2, 0x0, 0x82) tkill(r0, 0x1004000000016) [ 745.211563] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 745.255820] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 18:55:56 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) 18:55:56 executing program 5: accept$alg(0xffffffffffffff9c, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000080)="0adc1f123c123d319bd070") sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 18:55:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) 18:55:56 executing program 5: accept$alg(0xffffffffffffff9c, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000080)="0adc1f123c123d319bd070") sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 745.814683] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 18:55:56 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:56 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) 18:55:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) [ 746.016698] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 18:55:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) 18:55:56 executing program 5: accept$alg(0xffffffffffffff9c, 0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0x20000000006) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f0000000080)="0adc1f123c123d319bd070") sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 18:55:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7d}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x401c5820, &(0x7f0000000240)) [ 746.185332] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 18:55:57 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:57 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x20a154cc) 18:55:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:57 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:57 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r0, &(0x7f0000000140)={0x0, 0x42, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) 18:55:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x20a154cc) 18:55:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:57 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x20a154cc) 18:55:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:58 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x10, 0x802, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x20a154cc) 18:55:58 executing program 3: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000000)={0x0, 0x5000, 0x3, 0xa}) 18:55:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="31000000130009006900000000000010ab008048130000004600010700000014080003c0251c0000000000002000000000", 0x31}], 0x1) 18:55:58 executing program 3: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) 18:55:58 executing program 5: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:58 executing program 3: ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') mlock2(&(0x7f0000bcc000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 18:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 18:55:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 18:55:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086604, 0x0) [ 747.754518] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 18:55:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 18:55:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="31000000130009006900000000000010ab008048130000004600010700000014080003c0251c0000000000002000000000", 0x31}], 0x1) 18:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 18:55:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000100)=0xb0) 18:55:58 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 18:55:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000100)=0xb0) [ 747.926304] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 18:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x220) 18:55:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 18:55:58 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) close(r0) 18:55:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = dup(r0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xb}, 0x14) 18:55:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="31000000130009006900000000000010ab008048130000004600010700000014080003c0251c0000000000002000000000", 0x31}], 0x1) 18:55:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000100)=0xb0) 18:55:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 18:55:58 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, 0x0, 0x0) 18:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000086dd6361696630000000000000000000000076657468315f746f5f7465616d00000073797a6b616c6c65723100000000000076657468315f746f5f7465616d000000aaaaaaaaaabb0000000000000180c20000000000000000000000e8000000e80000001801000069703600000000000000000000000000000000000000000000000000000000005000000000000000fe80000000000000000000000000000000000000000000000000ffffac1e0000000000000000000000004000000000000000000000000000000000000000113e000000f9001e0000000000000041554449540000000000080000000000000000000000000000000000000000000800"/424]}, 0x220) [ 748.086390] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 18:55:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="31000000130009006900000000000010ab008048130000004600010700000014080003c0251c0000000000002000000000", 0x31}], 0x1) 18:55:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = dup(r0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xb}, 0x14) 18:55:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000100)=0xb0) 18:55:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 18:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:58 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000200)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) listen(0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8443, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000080)={0x3, 0x3, 0x1, [], 0x0}) [ 748.223674] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 18:55:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = dup(r0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xb}, 0x14) 18:55:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:55:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)) 18:55:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 18:55:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r1 = dup(r0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0xb}, 0x14) 18:55:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000b00)=@acquire={0x134, 0x17, 0x209, 0x0, 0x0, {{@in=@dev}, @in6=@local, {@in6, @in6=@remote}, {{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@policy_type={0xc, 0x10, {0x181ee4cfb2921577}}]}, 0x134}}, 0x0) 18:55:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 748.527032] kauditd_printk_skb: 31 callbacks suppressed [ 748.527040] audit: type=1400 audit(1556650559.012:2068): avc: denied { map } for pid=27075 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 18:55:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) [ 748.652902] audit: type=1400 audit(1556650559.141:2069): avc: denied { map } for pid=27083 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.926912] audit: type=1400 audit(1556650559.419:2070): avc: denied { map } for pid=27093 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.949337] audit: type=1400 audit(1556650559.419:2071): avc: denied { map } for pid=27093 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x6, 0x0, &(0x7f0000000fc0)) 18:55:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:55:59 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x2200c4e, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/72) 18:55:59 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) 18:55:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 18:55:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x6, 0x0, &(0x7f0000000fc0)) 18:55:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 18:55:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x6, 0x0, &(0x7f0000000fc0)) 18:55:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00H') r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00\x1aw\xb7\xc3B\xef\xf0\xd5\xf34|\x98.\x857Y\xab[d\xfa\x83\xdf\xc6\xf3\xb5\xab\xbb\x98y\xe7\xff\x87o\xb2\xfe\xd0\x9d\x9a\x89\xfe\xc4\x1d\x92|z\xbc\nl%\x97,#\xab3aEW\x18A3@\x94\x05%Y\x1d\x90\xf3\xc8\x89\x9a.\x7fm5\xaa\b\xceo\t\xcc\x98\xb7\x18\x90\x1cM\x91\x0fzb\x85\xb5$\x86\xe4\xd9\x1bJ\x1f\xf0>\x18\xed\xb0\r.8\xc9\xcb\x03t\xa7\xd0D\x04\x1d\x04$\xecAb\b\xcf\xd40\xe8qg\xc5\x18\xd1\x8f\xe6D\xa8\x00\xf6H|y\xa1\x0f\xde\xe3\xbb\'\xb1\x02\x00\xc8p\xbfQh\"\n=\x90\xf9vUo9\x85\xb3\xa9\xec\xda\xc2\x99\xbe8\x9f[*\x80\xb7%\x9d33\xb9\xc3\xf0\x11!\x11\xc3\xa5$<\xcfC\x91|\x05\x1aO\xb4\xf0_\xbd>\xf3[\xbb[\x058\x01\xf4\xca\xf4(\xab8\x87R\xc8\xe0l\xce\x930\xec\xf5\x8f\xb0%I\xb7\x7f[\\i\xfb\x96d\xa1aA\x97j\xc3\xef\xb65\xc0e\xb2%\x1f\xba}\x0e$\x16\xbcw\xff&DRYp\xb8I\xc3\xa8\xee\x03\x19\xe8\xd9\x18i\xffHw\xea\x9d\x86\x0e\bl5\x945\xab\xd3\xef\x11\xbd\"\xbc\xf3\x8b\xf2.:\x8c\xe2\xb2\a\xac\x8b\x19\x80\x8b\xa3&\x19\x16\x80\xa1\x88\xbe\xc3\x0f\xf3\xb7V]\x89e\xf2D\xf6T\xc0\xb8/\xa5\x11\x15\x8cqV/', 0x0, 0x0) preadv(r1, &(0x7f00000024c0)=[{0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x1000000000000220, 0x800000) 18:55:59 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x2}, 0x20) [ 749.288259] audit: type=1400 audit(1556650559.776:2072): avc: denied { map } for pid=27124 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSPASS(r1, 0x4010744d, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) 18:55:59 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$KVM_SET_CPUID(r0, 0x4004551e, &(0x7f0000000000)=ANY=[]) ioctl$sock_inet_SIOCRTMSG(r0, 0xc00c5512, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}}) [ 749.407275] audit: type=1400 audit(1556650559.795:2073): avc: denied { map } for pid=27124 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:55:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:55:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r0, 0x65, 0x6, 0x0, &(0x7f0000000fc0)) 18:56:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 18:56:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_PIT2(r1, 0xc048ae65, &(0x7f0000000140)) 18:56:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280), 0x4) [ 749.517661] audit: type=1400 audit(1556650559.805:2074): avc: denied { map } for pid=27124 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:00 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000500100f000ee1000c08000f0000000000", 0x24) 18:56:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x80000000000000bd) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r2, &(0x7f0000004680)=[{{0x0, 0x0, 0x0}}], 0x4000000000000c7, 0x0, 0x0) close(r2) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) close(r2) 18:56:00 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) [ 749.670135] audit: type=1400 audit(1556650559.805:2075): avc: denied { map } for pid=27124 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:56:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@hide='hide'}]}) 18:56:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000110) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 18:56:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280), 0x4) 18:56:00 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) [ 749.776572] audit: type=1400 audit(1556650559.815:2076): avc: denied { map } for pid=27124 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:00 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:00 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:00 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) [ 749.857545] audit: type=1400 audit(1556650559.815:2077): avc: denied { map } for pid=27124 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:00 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280), 0x4) 18:56:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000100)={0x98f907, 0x1, @value}) 18:56:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a60000000a84306910000003900070035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 18:56:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:01 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280), 0x4) 18:56:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 750.546925] IPv6: NLM_F_REPLACE set, but no existing node found! 18:56:01 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000000480)=0x9, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast1}, 0x1c) sendto$inet6(r1, &(0x7f0000000d40)="ddd9", 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 18:56:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a60000000a84306910000003900070035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 18:56:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000140)={0x7b, 0x600000000000000, [0x40000073], [0xc2]}) 18:56:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) listen(r0, 0x1f) 18:56:01 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0xb0, 0xb0, 0x128, [@time={'time\x00', 0x18}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x230) 18:56:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) listen(r0, 0x1f) [ 750.737745] IPv6: NLM_F_REPLACE set, but no existing node found! 18:56:01 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a60000000a84306910000003900070035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 18:56:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:01 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) listen(r0, 0x1f) [ 750.952740] IPv6: NLM_F_REPLACE set, but no existing node found! 18:56:01 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0xb0, 0xb0, 0x128, [@time={'time\x00', 0x18}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x230) 18:56:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) 18:56:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:04 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a60000000a84306910000003900070035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 18:56:04 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) listen(r0, 0x1f) 18:56:04 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0xb0, 0xb0, 0x128, [@time={'time\x00', 0x18}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x230) 18:56:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) [ 753.754871] kauditd_printk_skb: 22 callbacks suppressed [ 753.754879] audit: type=1400 audit(1556650564.208:2100): avc: denied { map } for pid=27256 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 753.765768] audit: type=1400 audit(1556650564.208:2101): avc: denied { map } for pid=27256 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.842582] IPv6: NLM_F_REPLACE set, but no existing node found! 18:56:04 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x20, 0x1, 0x1b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0xb0, 0xb0, 0x128, [@time={'time\x00', 0x18}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x230) 18:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b409000030000002024300600000000000ffffe0000002ff02000000000000000000000001810090780007040060b680fa0000000000000000000000000000ffffff8cffff00000000000000000000ffffac14ffbb3d8a6710e5e5a13b9e7f584ad4675cae080a41be5a0000"], 0x0) 18:56:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 18:56:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 754.020427] audit: type=1400 audit(1556650564.466:2102): avc: denied { map } for pid=27270 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 754.053873] audit: type=1400 audit(1556650564.486:2103): avc: denied { map } for pid=27270 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 754.076606] audit: type=1400 audit(1556650564.496:2104): avc: denied { map } for pid=27270 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 754.165630] audit: type=1400 audit(1556650564.605:2105): avc: denied { map } for pid=27274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 754.201433] audit: type=1400 audit(1556650564.635:2106): avc: denied { map } for pid=27274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) 18:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 18:56:07 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 18:56:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 18:56:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00'}) 18:56:07 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getpeername$tipc(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x12, r0, 0x0) 18:56:07 executing program 4: pause() futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="66430f67c564ff0941c366440f56c9660f3a16649c6700c40249adc66201dbd04b000f11d4440f18db") syz_execute_func(&(0x7f00000004c0)="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") 18:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 18:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x11, 0x6, 0x3, 0x0, [{}, {[@multicast1]}]}, @ssrr={0x89, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 18:56:07 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt(r0, 0x10d, 0xb, &(0x7f0000000080)="85a6af16", 0x4) 18:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000100)) 18:56:07 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt(r0, 0x10d, 0xb, &(0x7f0000000080)="85a6af16", 0x4) [ 757.157187] audit: type=1400 audit(1556650567.570:2107): avc: denied { map } for pid=27305 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) 18:56:10 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:56:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fb4)="24000000430007031dfffd946fa20600000000000d000100000000000000a3a20400ff79", 0x24}], 0x1}, 0x0) 18:56:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt(r0, 0x10d, 0xb, &(0x7f0000000080)="85a6af16", 0x4) 18:56:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:56:10 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 18:56:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fb4)="24000000430007031dfffd946fa20600000000000d000100000000000000a3a20400ff79", 0x24}], 0x1}, 0x0) 18:56:10 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt(r0, 0x10d, 0xb, &(0x7f0000000080)="85a6af16", 0x4) [ 760.005907] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 18:56:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:56:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fb4)="24000000430007031dfffd946fa20600000000000d000100000000000000a3a20400ff79", 0x24}], 0x1}, 0x0) 18:56:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 760.242587] audit: type=1400 audit(1556650570.635:2108): avc: denied { map } for pid=27326 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:10 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fb4)="24000000430007031dfffd946fa20600000000000d000100000000000000a3a20400ff79", 0x24}], 0x1}, 0x0) [ 760.366104] audit: type=1400 audit(1556650570.664:2109): avc: denied { map } for pid=27326 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.443194] audit: type=1400 audit(1556650570.803:2110): avc: denied { map } for pid=27335 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.481323] audit: type=1400 audit(1556650570.833:2111): avc: denied { map } for pid=27335 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:13 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 18:56:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:13 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:56:13 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 763.067622] audit: type=1400 audit(1556650573.431:2112): avc: denied { name_bind } for pid=27337 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 763.139108] dccp_close: ABORT with 134 bytes unread [ 763.158930] audit: type=1400 audit(1556650573.431:2113): avc: denied { node_bind } for pid=27337 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="30022dd1343ee16aa1a915baba3071bb1455050066c5022bb122005053eb0fe07b10970a55b319833a289e09f8cd07e78652da2ab26528ab4a85e795001ac18e7333681917247b6de211c2a089fc6366f0874ab617f349cdb02859f21abee2efb1ee4134a0c01e052a1c92402aeda8a85fe347c8badbb3f11788be78663e771fd79055e4de603d8338c67929047dbaded6d9f936159f3a93c570b173003ba311e3ba27362f1d2276dffb62b0e928367cff96d3d1122efab10ba06d409acda493327e9c3a09ae0982835216d24bdd12fb6b3da4be6988f55708d0155d24a247c4976a63cc65ab934ef94bf3b3ada44cb354a29db306ccb1627b44dce2c9c17a17048e47162e4c6b8a484fb3769aec000000000000000000000000ffff20"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 763.186712] audit: type=1400 audit(1556650573.441:2114): avc: denied { name_connect } for pid=27337 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:56:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:56:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 763.219826] audit: type=1400 audit(1556650573.530:2115): avc: denied { name_bind } for pid=27337 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 763.364092] audit: type=1400 audit(1556650573.530:2116): avc: denied { node_bind } for pid=27337 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:56:13 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:13 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 763.423326] audit: type=1400 audit(1556650573.540:2117): avc: denied { name_connect } for pid=27337 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 763.627173] binder: 27366:27368 unknown command 0 [ 763.632497] binder: 27366:27368 ioctl c0306201 20000440 returned -22 [ 763.670226] dccp_close: ABORT with 134 bytes unread 18:56:14 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 18:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:14 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:56:14 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 18:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:14 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) lstat(0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a875"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 764.071999] binder: 27372:27383 unknown command 0 [ 764.089295] binder: 27372:27383 ioctl c0306201 20000440 returned -22 18:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 764.358453] dccp_close: ABORT with 134 bytes unread 18:56:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 764.549961] dccp_close: ABORT with 134 bytes unread 18:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 764.873670] binder: 27404:27410 unknown command 0 [ 764.879293] binder: 27404:27410 ioctl c0306201 20000440 returned -22 18:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="30022dd1343ee16aa1a915baba3071bb1455050066c5022bb122005053eb0fe07b10970a55b319833a289e09f8cd07e78652da2ab26528ab4a85e795001ac18e7333681917247b6de211c2a089fc6366f0874ab617f349cdb02859f21abee2efb1ee4134a0c01e052a1c92402aeda8a85fe347c8badbb3f11788be78663e771fd79055e4de603d8338c67929047dbaded6d9f936159f3a93c570b173003ba311e3ba27362f1d2276dffb62b0e928367cff96d3d1122efab10ba06d409acda493327e9c3a09ae0982835216d24bdd12fb6b3da4be6988f55708d0155d24a247c4976a63cc65ab934ef94bf3b3ada44cb354a29db306ccb1627b44dce2c9c17a17048e47162e4c6b8a484fb3769aec000000000000000000000000ffff20"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 765.423127] kauditd_printk_skb: 49 callbacks suppressed [ 765.423136] audit: type=1400 audit(1556650575.772:2167): avc: denied { name_bind } for pid=27422 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 765.457274] audit: type=1400 audit(1556650575.772:2168): avc: denied { node_bind } for pid=27422 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 765.495475] audit: type=1400 audit(1556650575.841:2169): avc: denied { name_connect } for pid=27422 comm="syz-executor.0" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="30022dd1343ee16aa1a915baba3071bb1455050066c5022bb122005053eb0fe07b10970a55b319833a289e09f8cd07e78652da2ab26528ab4a85e795001ac18e7333681917247b6de211c2a089fc6366f0874ab617f349cdb02859f21abee2efb1ee4134a0c01e052a1c92402aeda8a85fe347c8badbb3f11788be78663e771fd79055e4de603d8338c67929047dbaded6d9f936159f3a93c570b173003ba311e3ba27362f1d2276dffb62b0e928367cff96d3d1122efab10ba06d409acda493327e9c3a09ae0982835216d24bdd12fb6b3da4be6988f55708d0155d24a247c4976a63cc65ab934ef94bf3b3ada44cb354a29db306ccb1627b44dce2c9c17a17048e47162e4c6b8a484fb3769aec000000000000000000000000ffff20"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:15 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 765.575210] audit: type=1400 audit(1556650575.920:2170): avc: denied { map } for pid=27424 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.649260] audit: type=1400 audit(1556650575.920:2171): avc: denied { map } for pid=27424 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.673352] audit: type=1400 audit(1556650575.980:2172): avc: denied { name_bind } for pid=27426 comm="syz-executor.5" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 765.698859] audit: type=1400 audit(1556650575.990:2173): avc: denied { node_bind } for pid=27426 comm="syz-executor.5" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 765.722536] audit: type=1400 audit(1556650576.020:2174): avc: denied { name_connect } for pid=27426 comm="syz-executor.5" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 765.747160] audit: type=1400 audit(1556650576.059:2175): avc: denied { name_bind } for pid=27428 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 765.762271] binder: 27426:27430 unknown command 0 18:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 765.780618] audit: type=1400 audit(1556650576.069:2176): avc: denied { node_bind } for pid=27428 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 765.795540] binder: 27426:27430 ioctl c0306201 20000440 returned -22 18:56:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sched_setaffinity(0x0, 0x5869aca75e529e6b, &(0x7f0000000000)=0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x100000001}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:56:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x222, 0x20007ff9) 18:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000001380)="fc0000004200071fab162504090007000a050000000000000000e293210001c000000000000000000000bfff0000000000001ec28656aaa79bb94b46fe000000bc000200000300d633d45000000a366c57c6a55e00000100d07302ade0ddd5d7d5bbc91a3e2e80772c05dffd5a32e280fc83ab82f605f70cce190a608a47e988399ddef2fe082038f4f8b29d3597f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd25f386b4c3b0720e7bd0734babc7c737d67013375743417e583df0200000000000000a6b567b4cf715587e6d8a1ad0a4f0108a8835d731d05b0b3f0329fdcbb7b27057a2100"/252, 0xfc) 18:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000001380)="fc0000004200071fab162504090007000a050000000000000000e293210001c000000000000000000000bfff0000000000001ec28656aaa79bb94b46fe000000bc000200000300d633d45000000a366c57c6a55e00000100d07302ade0ddd5d7d5bbc91a3e2e80772c05dffd5a32e280fc83ab82f605f70cce190a608a47e988399ddef2fe082038f4f8b29d3597f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd25f386b4c3b0720e7bd0734babc7c737d67013375743417e583df0200000000000000a6b567b4cf715587e6d8a1ad0a4f0108a8835d731d05b0b3f0329fdcbb7b27057a2100"/252, 0xfc) 18:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000001380)="fc0000004200071fab162504090007000a050000000000000000e293210001c000000000000000000000bfff0000000000001ec28656aaa79bb94b46fe000000bc000200000300d633d45000000a366c57c6a55e00000100d07302ade0ddd5d7d5bbc91a3e2e80772c05dffd5a32e280fc83ab82f605f70cce190a608a47e988399ddef2fe082038f4f8b29d3597f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd25f386b4c3b0720e7bd0734babc7c737d67013375743417e583df0200000000000000a6b567b4cf715587e6d8a1ad0a4f0108a8835d731d05b0b3f0329fdcbb7b27057a2100"/252, 0xfc) 18:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000001380)="fc0000004200071fab162504090007000a050000000000000000e293210001c000000000000000000000bfff0000000000001ec28656aaa79bb94b46fe000000bc000200000300d633d45000000a366c57c6a55e00000100d07302ade0ddd5d7d5bbc91a3e2e80772c05dffd5a32e280fc83ab82f605f70cce190a608a47e988399ddef2fe082038f4f8b29d3597f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd25f386b4c3b0720e7bd0734babc7c737d67013375743417e583df0200000000000000a6b567b4cf715587e6d8a1ad0a4f0108a8835d731d05b0b3f0329fdcbb7b27057a2100"/252, 0xfc) 18:56:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x5) ioctl$TCSETS(r0, 0x8925, &(0x7f0000000000)) 18:56:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@initdev}]}]}, 0x2c}}, 0x0) 18:56:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x222, 0x20007ff9) 18:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:16 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) [ 766.566062] binder: 27462:27466 unknown command 0 [ 766.572361] binder: 27462:27466 ioctl c0306201 20000440 returned -22 18:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="30022dd1343ee16aa1a915baba3071bb1455050066c5022bb122005053eb0fe07b10970a55b319833a289e09f8cd07e78652da2ab26528ab4a85e795001ac18e7333681917247b6de211c2a089fc6366f0874ab617f349cdb02859f21abee2efb1ee4134a0c01e052a1c92402aeda8a85fe347c8badbb3f11788be78663e771fd79055e4de603d8338c67929047dbaded6d9f936159f3a93c570b173003ba311e3ba27362f1d2276dffb62b0e928367cff96d3d1122efab10ba06d409acda493327e9c3a09ae0982835216d24bdd12fb6b3da4be6988f55708d0155d24a247c4976a63cc65ab934ef94bf3b3ada44cb354a29db306ccb1627b44dce2c9c17a17048e47162e4c6b8a484fb3769aec000000000000000000000000ffff20"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x222, 0x20007ff9) 18:56:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@initdev}]}]}, 0x2c}}, 0x0) 18:56:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x0, @multicast2}], 0x8) 18:56:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@initdev}]}]}, 0x2c}}, 0x0) 18:56:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x0, @multicast2}], 0x8) 18:56:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x0, @multicast2}], 0x8) 18:56:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x0, @multicast2}], 0x8) 18:56:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x2c, 0x16, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@initdev}]}]}, 0x2c}}, 0x0) 18:56:17 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f00000012c0)=0x44) 18:56:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:17 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r1, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = fcntl$dupfd(r3, 0x0, r4) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'trans=fd,'}}]}}) [ 767.432590] binder: 27492:27498 unknown command 0 [ 767.440798] binder: 27492:27498 ioctl c0306201 20000440 returned -22 18:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x0, 0x3000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x5, 0x800) ioctl$PPPIOCGUNIT(r2, 0x80047456, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getpid() waitid(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) write$rfkill(r2, &(0x7f00000000c0)={0x2, 0x1, 0x1, 0x1}, 0x8) listen(r1, 0x6) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000140)={'broute\x00'}, &(0x7f0000000040)=0x78) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r4 = semget(0x1, 0x3, 0x500) semctl$GETNCNT(r4, 0x1, 0xe, &(0x7f00000001c0)=""/5) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = accept(r1, 0x0, &(0x7f0000000080)=0xfe0f) sendto$inet(r5, &(0x7f0000000340)="25b4d5f7e2e8abecbfaac5b3f0291e53c705e10de93ca93e0ef27cea636c4eb48c9cd3e7d0c0a81149664d749223a6ace410fbb88d8745c25a2e921a1636ec6f96573e43c7d0c8ad6ee0e4470c52a355ff9a51464ccc05cbdc971615ddfd6a976f571771f7d68a693a8c88b76f130a2f363f87d842c72130b8886bae5929ffe596908790d2", 0x85, 0x1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r6 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR], 0x0, 0x6c00000000000000, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3180d070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) 18:56:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 18:56:17 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f00000012c0)=0x44) 18:56:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x222, 0x20007ff9) 18:56:17 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r1, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = fcntl$dupfd(r3, 0x0, r4) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'trans=fd,'}}]}}) 18:56:17 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f00000012c0)=0x44) 18:56:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, "8594beb494fd25372d8ab0120be1e4dd42a15531085782e4f511631a5c6ff3d2927133a01b83d273880e062429f75e5376a39459b842d018be2684c9a9cf4704", "98c7fa8788aebe18a7cffa7c67e7c264ece6e69948548042df2401fb1d759e314d517911e5be529f3b03bfcce2edd835912579243d6c64bc15d86150adbc71fd", "900b05f7ebdc5ced55e437aa32c493def4872bd680e08ba964f47eba9e4742af"}) 18:56:17 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r1, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = fcntl$dupfd(r3, 0x0, r4) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'trans=fd,'}}]}}) 18:56:18 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f00000012c0)=0x44) 18:56:18 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept(r1, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = fcntl$dupfd(r3, 0x0, r4) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'trans=fd,'}}]}}) 18:56:18 executing program 3: syz_execute_func(&(0x7f0000000080)="b1e091cd80696852ef695c00d946f91cc10f788e008000000fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746660f3a208f09000000767c7cca4f7307da7307da0f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 18:56:18 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00 \b\x00', 0x20, 0x1, 0x978, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'bond_slave_0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x8e8, [@among={'among\x00', 0x820, {{0x0, 0x25}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x9f0) 18:56:18 executing program 3: syz_execute_func(&(0x7f0000000080)="b1e091cd80696852ef695c00d946f91cc10f788e008000000fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746660f3a208f09000000767c7cca4f7307da7307da0f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 18:56:18 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00 \b\x00', 0x20, 0x1, 0x978, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'bond_slave_0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x8e8, [@among={'among\x00', 0x820, {{0x0, 0x25}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x9f0) 18:56:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x44, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6, 'dip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x44}}, 0x0) 18:56:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(r1, &(0x7f00000000c0), 0x8) 18:56:18 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x9, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffffb5}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:56:18 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00 \b\x00', 0x20, 0x1, 0x978, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'bond_slave_0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x8e8, [@among={'among\x00', 0x820, {{0x0, 0x25}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x9f0) 18:56:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x9, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffffb5}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:56:18 executing program 3: syz_execute_func(&(0x7f0000000080)="b1e091cd80696852ef695c00d946f91cc10f788e008000000fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746660f3a208f09000000767c7cca4f7307da7307da0f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 18:56:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x44, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6, 'dip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x44}}, 0x0) 18:56:18 executing program 3: syz_execute_func(&(0x7f0000000080)="b1e091cd80696852ef695c00d946f91cc10f788e008000000fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746660f3a208f09000000767c7cca4f7307da7307da0f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") 18:56:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x9, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffffb5}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:56:18 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00\x00 \b\x00', 0x20, 0x1, 0x978, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'bond_slave_0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x8e8, [@among={'among\x00', 0x820, {{0x0, 0x25}}}]}}, @common=@redirect={'redirect\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x9f0) 18:56:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="ddbb"]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:56:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(r1, &(0x7f00000000c0), 0x8) 18:56:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x44, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6, 'dip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x44}}, 0x0) 18:56:19 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x9, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xffffffb5}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 18:56:19 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x44, r1, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6, 'dip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x44}}, 0x0) 18:56:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:19 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x26}, @loopback, @mcast1, 0x0, 0x0, 0x0, 0x800000000113}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:56:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(r1, &(0x7f00000000c0), 0x8) 18:56:20 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:20 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:20 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0) 18:56:20 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x26}, @loopback, @mcast1, 0x0, 0x0, 0x0, 0x800000000113}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:56:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xf}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="72373de22b0ae89308cbf6b79e78", 0x0}, 0x28) 18:56:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@umask={'umask'}}, {@decompose='decompose'}, {@session={'session', 0x3d, 0x80000000}}]}) 18:56:20 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x26}, @loopback, @mcast1, 0x0, 0x0, 0x0, 0x800000000113}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:56:20 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:20 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r1, 0x84, 0x2, &(0x7f00000004c0)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r0) 18:56:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") r1 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) ppoll(&(0x7f0000000080)=[{r1}], 0x1, 0x0, 0x0, 0x0) signalfd(r1, &(0x7f00000000c0), 0x8) 18:56:21 executing program 4: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000100)={0x0, 0x0, 0x67272d32, 0x0, 0x0, 0x3}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="0f20e06635000002000f22e00f9350f20f232e0f47f5baf80c66b8c8a2558a66efbafc0c66ed0f35b85c000f00d0baf80c66b8fe65f68066efbafc0ced66b9870a000066b8d95f902966baf1a568110f300f231b"}], 0xaaaaaaaaaaaad03, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:56:21 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 18:56:21 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180)='7') 18:56:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) [ 771.014784] kauditd_printk_skb: 54 callbacks suppressed [ 771.014792] audit: type=1400 audit(1556650581.295:2231): avc: denied { map } for pid=27649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 771.064286] audit: type=1400 audit(1556650581.335:2232): avc: denied { relabelto } for pid=27639 comm="syz-executor.0" name="828" dev="sda1" ino=16602 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 18:56:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 771.102248] audit: type=1400 audit(1556650581.355:2233): avc: denied { map } for pid=27649 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.137050] audit: type=1400 audit(1556650581.355:2234): avc: denied { map } for pid=27649 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) [ 771.268714] audit: type=1400 audit(1556650581.365:2235): avc: denied { map } for pid=27649 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.372171] audit: type=1400 audit(1556650581.484:2236): avc: denied { map } for pid=27658 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.428859] audit: type=1400 audit(1556650581.484:2237): avc: denied { map } for pid=27658 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.497043] audit: type=1400 audit(1556650581.484:2238): avc: denied { map } for pid=27658 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.558545] audit: type=1400 audit(1556650581.514:2239): avc: denied { relabelto } for pid=27639 comm="syz-executor.0" name="828" dev="sda1" ino=16602 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 [ 771.618762] audit: type=1400 audit(1556650581.514:2240): avc: denied { map } for pid=27668 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:23 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x26}, @loopback, @mcast1, 0x0, 0x0, 0x0, 0x800000000113}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:56:23 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0xf) 18:56:23 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:23 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:23 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:26 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:26 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:26 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:26 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 776.354822] kauditd_printk_skb: 36 callbacks suppressed [ 776.354831] audit: type=1400 audit(1556650586.611:2277): avc: denied { map } for pid=27729 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:26 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 776.549912] audit: type=1400 audit(1556650586.641:2278): avc: denied { map } for pid=27729 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:26 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:26 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:26 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 776.723406] audit: type=1400 audit(1556650586.670:2279): avc: denied { map } for pid=27729 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:27 executing program 2: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:27 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 776.934246] audit: type=1400 audit(1556650586.710:2280): avc: denied { map } for pid=27733 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.117866] audit: type=1400 audit(1556650586.730:2281): avc: denied { map } for pid=27733 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:27 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x10d, 0x10, &(0x7f0000000280)={0x1}, 0x4a) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:27 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000001c0)={0x18, 0x1, 0x0, {0x3}}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000540)='./file0\x00', 0x0, 0x807a00, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) lsetxattr$trusted_overlay_upper(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x65, 0x20000001, 0xa69, "bf994f060ae552e8fddfffffffffffff", "c8570f0988c7980599309ffeeaa96770049018785f4752c88d818bf30a5de5b4c8618a7736910d631d2befeab5951a40d87b289d13bffc5ccb48814a2dabbd251feac7208cdb829103ba3b28c3283f59"}, 0x65, 0xfffffffffffffffc) read$alg(r0, &(0x7f0000000400)=""/195, 0xc3) socket$caif_seqpacket(0x25, 0x5, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100)={0x1}, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={@remote, 0x3b}) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x1, 0x1, 0x80000001}}, 0x28) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) lsetxattr$security_selinux(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:fuse_device_t:s0\x00', 0x23, 0x3) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) 18:56:27 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='nfs4\x00', 0x0, &(0x7f0000000300)='rdma') [ 777.235940] audit: type=1400 audit(1556650586.740:2282): avc: denied { map } for pid=27733 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:27 executing program 2: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:27 executing program 3: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) [ 777.384765] audit: type=1400 audit(1556650586.760:2283): avc: denied { map } for pid=27733 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 777.500269] audit: type=1400 audit(1556650586.770:2284): avc: denied { relabelto } for pid=27719 comm="syz-executor.5" name="460" dev="sda1" ino=16613 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 18:56:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="10e7000936cfd0d2e9"], 0x9) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000141042, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x8080fffffffe) 18:56:27 executing program 1: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:27 executing program 5: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:27 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='nfs4\x00', 0x0, &(0x7f0000000300)='rdma') [ 777.599628] audit: type=1400 audit(1556650586.819:2285): avc: denied { relabelto } for pid=27716 comm="syz-executor.1" name="488" dev="sda1" ino=16598 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fuse_device_t:s0 tclass=dir permissive=1 18:56:28 executing program 2: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) [ 777.748733] audit: type=1400 audit(1556650586.829:2286): avc: denied { map } for pid=27739 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:28 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='nfs4\x00', 0x0, &(0x7f0000000300)='rdma') 18:56:28 executing program 3: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='nfs4\x00', 0x0, &(0x7f0000000300)='rdma') 18:56:28 executing program 5: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x102000002) 18:56:28 executing program 1: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 2: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) fchdir(r0) 18:56:28 executing program 3: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 1: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:28 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 18:56:28 executing program 5: r0 = dup(0xffffffffffffffff) write$UHID_DESTROY(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 18:56:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) fchdir(r0) 18:56:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) fchdir(r0) 18:56:29 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0xc004, 0x0) faccessat(r0, &(0x7f000003b000)='./control\x00', 0x2, 0x0) 18:56:29 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 18:56:29 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) fchdir(r0) 18:56:29 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0xc004, 0x0) faccessat(r0, &(0x7f000003b000)='./control\x00', 0x2, 0x0) 18:56:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') readv(r0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/184, 0xe}], 0x1) 18:56:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = dup(r0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 18:56:29 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 18:56:29 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000480)={0x0, 0xfffffffd, 0x2, {0x2, @raw_data="c5d57e1409c8c8bfc4b0a6a486e6759ec6b71794ff0adc9ee376a40807fdd9774aece3e8b95da34ee175d3529bc03c3401cbd467e3a00b3f565d83fcdaa18e1364954192aa37c8b5d52de4df78b6ea9e89a2c13f92b9f7650b89fdf12ca7c48762bc81646f92b9f2270c1a324c9820fd0525a8c381ced94247dfa06a9362cdade36c5ee4e0463288dced378801a8dad713036ecfa51add03337e4cc1d3d7cdea599d986641334404b67bd660b034ebd565d306b651d8b3a7d05256fd53039928498f4aa480448183"}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000200)={0x0, 0x2, 0x0, {0x0, @raw_data="2085f3072c9b42f03f10be83b68ebcf014a0409fdf8be3d3e82c747c7f79f7cee00b443f02000000a91ca25441677d16ff0adc9e2d6eebf4bef6c96076d67f243aebaac6430c9ef1a788e60eb3d0a7c29a5e3416871c8a51df55701a05e0a2f09883c482efaf6dc9e1695038733a23bbf0faf76a1d3fae5c251c4fad507b2ead2f1581057e3f84f3e8503ee570d8069eb53a897d2dd5f3d89629917fb171132181e9f3c510ac5229a6b6096547977578c5795d84cf23fe1d042df97dbd37a4b3d0e338a1b611e3ae"}}) 18:56:29 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0xc004, 0x0) faccessat(r0, &(0x7f000003b000)='./control\x00', 0x2, 0x0) 18:56:29 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937f, 0x0) 18:56:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:29 executing program 4: r0 = socket(0x100000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000cc0)) 18:56:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = dup(r0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 18:56:29 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937f, 0x0) 18:56:29 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000021000)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./control\x00', 0xc004, 0x0) faccessat(r0, &(0x7f000003b000)='./control\x00', 0x2, 0x0) 18:56:29 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 18:56:29 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937f, 0x0) 18:56:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = dup(r0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 18:56:29 executing program 4: r0 = socket(0x100000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000cc0)) 18:56:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:30 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl(r0, 0x800000000000937f, 0x0) 18:56:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="984a2ae92cb8b64c0f05bf0300891bc4a37bf0c5c041e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091ed5dee5465721045f4607f2f0fe4900c426f2f045f61964620f38fd52262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000f00c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f1070bb3ddcdcda2660f3834680084635e4c3fcaa3c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") 18:56:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = dup(r0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) read(r1, &(0x7f0000001900)=""/4096, 0xfec5) ftruncate(r2, 0x8007d) sendfile(r1, r2, 0x0, 0x2008000fffffffd) 18:56:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:30 executing program 4: r0 = socket(0x100000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000cc0)) 18:56:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='.', 0x0, 0x500f, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x1000, 0x0) 18:56:30 executing program 0: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bridge0\x00'}) 18:56:30 executing program 4: r0 = socket(0x100000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, 0x0, &(0x7f0000000cc0)) 18:56:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bridge0\x00'}) 18:56:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r1) 18:56:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = gettid() clone(0x2106001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x8000000000040) ptrace(0x10, r1) ptrace(0x11, r1) syz_execute_func(&(0x7f0000000300)="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") 18:56:30 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x1) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0xffffff8c) ioctl$int_in(r0, 0x80006000005000, 0x0) 18:56:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r1) 18:56:30 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) 18:56:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0x3b0, &(0x7f00001a7f05)=""/251}, 0x42) 18:56:30 executing program 0: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="a84a2ae92c431c850f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e29c03030fb8c40b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b00c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6af3e6766f2ab38e3440fec3f400f45f4acc4c3214cb9a5604b19c2f2adf08171a3038a82166e6e0f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f526264788fe49c4f6a1dd7dbbbfdd5cf65cf6c649bedcdca1c9fb110f66474f383ae34b9fb7e2") 18:56:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r1) 18:56:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bridge0\x00'}) 18:56:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0x3b0, &(0x7f00001a7f05)=""/251}, 0x42) 18:56:30 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) [ 780.380410] xprt_adjust_timeout: rq_timeout = 0! 18:56:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) close(r1) 18:56:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0x3b0, &(0x7f00001a7f05)=""/251}, 0x42) 18:56:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bridge0\x00'}) 18:56:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0x3b0, &(0x7f00001a7f05)=""/251}, 0x42) [ 780.619491] xprt_adjust_timeout: rq_timeout = 0! 18:56:30 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:30 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) 18:56:31 executing program 0: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 780.904117] xprt_adjust_timeout: rq_timeout = 0! 18:56:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="a84a2ae92c431c850f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e29c03030fb8c40b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b00c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6af3e6766f2ab38e3440fec3f400f45f4acc4c3214cb9a5604b19c2f2adf08171a3038a82166e6e0f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f526264788fe49c4f6a1dd7dbbbfdd5cf65cf6c649bedcdca1c9fb110f66474f383ae34b9fb7e2") 18:56:31 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:31 executing program 4: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="000000000000000000000000000000000100000004000000020000000000000000000000000000800c000000000000000008000000000000000000000000000000000000000000000005000000000000000000000000000000f348c64a00000000000000000000000000000000000000000100000000000000000000000000000072ba74391c58ac5de423bcf6d0574c3935785f0ff9a70504e08304b7996c4c98c7a237df76a3fd668491454f703d9d6dd0ad6ed9ffafb300c7bc44c1f66e7b4d35a23d3dd63c9e206e4c2ae862793daf229554c7ea0627611a126dc16fb1da06034827d54a80ac77741ec017a229189999c19b05904df439a9eb94f40b917683a5690c88cf4cb48d2b157f80d08d1861ba3dcd450159b044384d50760a6e10aeab6c6088e55a4db78aa7645063afbf4000c767e7b6ba10f1ed086334aa55e00400355d94c70f72cfa7376dd30a"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:31 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:31 executing program 3: creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0xa00000000, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x4000, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) 18:56:31 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 781.416143] kauditd_printk_skb: 168 callbacks suppressed [ 781.416151] audit: type=1400 audit(1556650591.629:2455): avc: denied { syslog } for pid=27991 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:56:31 executing program 4: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="000000000000000000000000000000000100000004000000020000000000000000000000000000800c000000000000000008000000000000000000000000000000000000000000000005000000000000000000000000000000f348c64a00000000000000000000000000000000000000000100000000000000000000000000000072ba74391c58ac5de423bcf6d0574c3935785f0ff9a70504e08304b7996c4c98c7a237df76a3fd668491454f703d9d6dd0ad6ed9ffafb300c7bc44c1f66e7b4d35a23d3dd63c9e206e4c2ae862793daf229554c7ea0627611a126dc16fb1da06034827d54a80ac77741ec017a229189999c19b05904df439a9eb94f40b917683a5690c88cf4cb48d2b157f80d08d1861ba3dcd450159b044384d50760a6e10aeab6c6088e55a4db78aa7645063afbf4000c767e7b6ba10f1ed086334aa55e00400355d94c70f72cfa7376dd30a"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:31 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 781.513247] audit: type=1400 audit(1556650591.629:2457): avc: denied { syslog } for pid=27991 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:56:31 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="000000000000000000000000000000000100000004000000020000000000000000000000000000800c000000000000000008000000000000000000000000000000000000000000000005000000000000000000000000000000f348c64a00000000000000000000000000000000000000000100000000000000000000000000000072ba74391c58ac5de423bcf6d0574c3935785f0ff9a70504e08304b7996c4c98c7a237df76a3fd668491454f703d9d6dd0ad6ed9ffafb300c7bc44c1f66e7b4d35a23d3dd63c9e206e4c2ae862793daf229554c7ea0627611a126dc16fb1da06034827d54a80ac77741ec017a229189999c19b05904df439a9eb94f40b917683a5690c88cf4cb48d2b157f80d08d1861ba3dcd450159b044384d50760a6e10aeab6c6088e55a4db78aa7645063afbf4000c767e7b6ba10f1ed086334aa55e00400355d94c70f72cfa7376dd30a"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:31 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 781.734896] audit: type=1400 audit(1556650591.629:2456): avc: denied { create } for pid=27989 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:56:32 executing program 0: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:32 executing program 4: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 781.932950] audit: type=1400 audit(1556650591.688:2459): avc: denied { syslog } for pid=27991 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:56:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="a84a2ae92c431c850f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e29c03030fb8c40b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b00c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6af3e6766f2ab38e3440fec3f400f45f4acc4c3214cb9a5604b19c2f2adf08171a3038a82166e6e0f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f526264788fe49c4f6a1dd7dbbbfdd5cf65cf6c649bedcdca1c9fb110f66474f383ae34b9fb7e2") 18:56:32 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:32 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:32 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="b11791cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118c40213f5930a0000000013a4001369879f000000fe") [ 782.141947] audit: type=1400 audit(1556650591.679:2458): avc: denied { write } for pid=27989 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:56:32 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="b11791cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118c40213f5930a0000000013a4001369879f000000fe") 18:56:32 executing program 3: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 782.340076] audit: type=1400 audit(1556650591.708:2461): avc: denied { syslog } for pid=27991 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:56:32 executing program 1: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) [ 782.397399] audit: type=1400 audit(1556650591.698:2460): avc: denied { read } for pid=27989 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 782.422475] audit: audit_backlog=65 > audit_backlog_limit=64 [ 782.454942] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 782.468880] audit: audit_backlog=65 > audit_backlog_limit=64 18:56:32 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="b11791cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118c40213f5930a0000000013a4001369879f000000fe") 18:56:32 executing program 5: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1000000002, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x400) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000300)={0xf262, [0x2, 0x80000000, 0x7, 0x8001, 0x4, 0x2, 0x7ff, 0x59, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0xffffffff, 0x5eb, 0x0, 0x1f, 0x9, 0x5, 0x6, 0xf8, 0x52c, 0x9, 0x8, 0x20, 0x145e, 0x4, 0x1f, 0x19, 0xff, 0xa8f, 0x3, 0x8, 0x7fff, 0x0, 0xfffffffffffffff9, 0xffffffffffffff7f, 0xfffffffffffffc00, 0x2, 0x7, 0x100, 0x1, 0x8, 0xfffffffffffffbff, 0xffffffffffffffff, 0x7, 0x4, 0x7], 0x4}) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000000)={{0x9, 0x7, 0x0, 0x2, 0x2, 0x9}, 0x7f}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) sendfile(r2, r3, 0x0, 0x20000102000007) 18:56:32 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) 18:56:32 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="b11791cd801b69696c69dc00d9d9d0c44139fd5bf9c7c7e4c653fb0fc4014c58c4a1e96be7c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c36645c4c1e173fb65f1400fae28787c3e460f569f000000003ef0954200fcc401fe5ff6c4a27d33e4646736676666430fefb3000000000804f4c4837d1118c40213f5930a0000000013a4001369879f000000fe") 18:56:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_execute_func(&(0x7f0000000100)="a84a2ae92c431c850f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e29c03030fb8c40b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b00c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f6af3e6766f2ab38e3440fec3f400f45f4acc4c3214cb9a5604b19c2f2adf08171a3038a82166e6e0f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f526264788fe49c4f6a1dd7dbbbfdd5cf65cf6c649bedcdca1c9fb110f66474f383ae34b9fb7e2") 18:56:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_proto_private(r2, 0x89e7, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r1, r3, 0x0, 0x800000000024) 18:56:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) [ 783.348831] protocol 88fb is buggy, dev hsr_slave_0 [ 783.354135] protocol 88fb is buggy, dev hsr_slave_1 18:56:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:33 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 783.510189] protocol 88fb is buggy, dev hsr_slave_0 [ 783.510213] protocol 88fb is buggy, dev hsr_slave_1 [ 783.515305] protocol 88fb is buggy, dev hsr_slave_1 18:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_proto_private(r2, 0x89e7, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r1, r3, 0x0, 0x800000000024) 18:56:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x2000000) 18:56:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:56:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_proto_private(r2, 0x89e7, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r1, r3, 0x0, 0x800000000024) 18:56:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:56:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:34 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) 18:56:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_proto_private(r2, 0x89e7, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r1, r3, 0x0, 0x800000000024) 18:56:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 18:56:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) [ 784.800891] protocol 88fb is buggy, dev hsr_slave_0 [ 784.806178] protocol 88fb is buggy, dev hsr_slave_1 [ 784.811341] protocol 88fb is buggy, dev hsr_slave_0 [ 784.816493] protocol 88fb is buggy, dev hsr_slave_1 18:56:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x225) sendfile(r1, r1, &(0x7f0000000300), 0x7fff) 18:56:35 executing program 3: creat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) 18:56:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect(r0, &(0x7f0000000180)=@nl=@unspec, 0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendfile(r0, r1, 0x0, 0x523) 18:56:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) 18:56:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x163882) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x81) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, {0x2, @local, 'team_slave_0\x00'}}, 0x1e) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x80) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 18:56:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 18:56:35 executing program 1: syz_execute_func(&(0x7f0000000080)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 18:56:35 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_THREAD_EXIT(r0, 0x40046205, 0x3) [ 785.439067] sctp: [Deprecated]: syz-executor.5 (pid 28138) Use of int in max_burst socket option. [ 785.439067] Use struct sctp_assoc_value instead 18:56:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7df) fstat(r0, &(0x7f0000000500)) 18:56:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'vet\x00\x00\x00\x00\x1e\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 18:56:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) 18:56:35 executing program 1: syz_execute_func(&(0x7f0000000080)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 18:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x17, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2000000028) fcntl$setstatus(r0, 0x4, 0x42000) [ 785.582962] sctp: [Deprecated]: syz-executor.5 (pid 28157) Use of int in max_burst socket option. [ 785.582962] Use struct sctp_assoc_value instead 18:56:36 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7df) fstat(r0, &(0x7f0000000500)) 18:56:36 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000400)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0x0, 0x4}]}) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 18:56:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) 18:56:36 executing program 1: syz_execute_func(&(0x7f0000000080)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 18:56:36 executing program 3: syz_execute_func(&(0x7f0000000280)="982ce00f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac10000000808f294001b00b0000000f71d539f08171a38a806ebb57c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:56:36 executing program 1: syz_execute_func(&(0x7f0000000080)="1c1bb5b598cd801b69e4f56962f5696200d9d9d017795b69f9f9680c0000008fe9589b26c7e4c753fbc4f1ede1fed4f47d82663ed107c4c2b90a23f216657051c422b18cb6070000005151ccc4a27d181e1eea01eff265dc5f003e460fc37d105b5b45e145af35af353541000f9a9999030faee42c240f54635bde3ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 18:56:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 786.411758] sctp: [Deprecated]: syz-executor.5 (pid 28175) Use of int in max_burst socket option. [ 786.411758] Use struct sctp_assoc_value instead 18:56:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:36 executing program 0: fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, 0x0) 18:56:36 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7df) fstat(r0, &(0x7f0000000500)) [ 786.479692] kauditd_printk_skb: 342 callbacks suppressed [ 786.479700] audit: type=1400 audit(1556650596.657:2795): avc: denied { map } for pid=28181 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:36 executing program 0: fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, 0x0) [ 786.559424] sctp: [Deprecated]: syz-executor.5 (pid 28187) Use of int in max_burst socket option. [ 786.559424] Use struct sctp_assoc_value instead [ 786.601352] audit: type=1400 audit(1556650596.776:2796): avc: denied { node_bind } for pid=28184 comm="syz-executor.1" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 786.635579] audit: type=1400 audit(1556650596.806:2797): avc: denied { name_connect } for pid=28184 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 786.700505] audit: type=1400 audit(1556650596.875:2798): avc: denied { map } for pid=28196 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 786.723113] audit: type=1400 audit(1556650596.875:2799): avc: denied { node_bind } for pid=28184 comm="syz-executor.1" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x17, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2000000028) fcntl$setstatus(r0, 0x4, 0x42000) 18:56:38 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000600000007000000000000000000000034f34df699131bdd070000000100000000fb6c7a2c089af900000000000000000000009b41dcd13d"}, 0x50) 18:56:38 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x7df) fstat(r0, &(0x7f0000000500)) 18:56:38 executing program 0: fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, 0x0) 18:56:38 executing program 3: syz_execute_func(&(0x7f0000000280)="982ce00f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac10000000808f294001b00b0000000f71d539f08171a38a806ebb57c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:56:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:38 executing program 0: fanotify_init(0x0, 0x0) pselect6(0x40, &(0x7f0000000300), 0x0, &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, 0x0) [ 788.731736] SELinux: unknown common = [ 788.747185] audit: type=1400 audit(1556650598.898:2800): avc: denied { node_bind } for pid=28198 comm="syz-executor.1" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 788.786424] SELinux: failed to load policy 18:56:39 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000600000007000000000000000000000034f34df699131bdd070000000100000000fb6c7a2c089af900000000000000000000009b41dcd13d"}, 0x50) 18:56:39 executing program 3: syz_execute_func(&(0x7f0000000280)="982ce00f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac10000000808f294001b00b0000000f71d539f08171a38a806ebb57c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:56:39 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x400000000000005, 0x100000000000000c, 0x804, 0x8}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10b) [ 788.821700] audit: type=1400 audit(1556650598.938:2801): avc: denied { name_connect } for pid=28198 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:56:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) [ 788.944011] audit: type=1400 audit(1556650599.017:2802): avc: denied { node_bind } for pid=28212 comm="syz-executor.4" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 788.948608] SELinux: unknown common = [ 789.028209] SELinux: failed to load policy [ 789.049632] audit: type=1400 audit(1556650599.017:2803): avc: denied { name_connect } for pid=28212 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 789.088528] audit: type=1400 audit(1556650599.067:2804): avc: denied { map } for pid=28218 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x17, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2000000028) fcntl$setstatus(r0, 0x4, 0x42000) 18:56:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x400000000000005, 0x100000000000000c, 0x804, 0x8}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10b) 18:56:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:41 executing program 3: syz_execute_func(&(0x7f0000000280)="982ce00f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac10000000808f294001b00b0000000f71d539f08171a38a806ebb57c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 18:56:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000600000007000000000000000000000034f34df699131bdd070000000100000000fb6c7a2c089af900000000000000000000009b41dcd13d"}, 0x50) 18:56:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x400000000000005, 0x100000000000000c, 0x804, 0x8}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10b) [ 791.796804] kauditd_printk_skb: 4 callbacks suppressed [ 791.796814] audit: type=1400 audit(1556650601.923:2809): avc: denied { node_bind } for pid=28234 comm="syz-executor.4" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 791.805016] SELinux: unknown common = [ 791.862487] SELinux: failed to load policy 18:56:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f000600000007000000000000000000000034f34df699131bdd070000000100000000fb6c7a2c089af900000000000000000000009b41dcd13d"}, 0x50) 18:56:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x400000000000005, 0x100000000000000c, 0x804, 0x8}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)}, 0x10b) [ 791.892681] audit: type=1400 audit(1556650601.972:2810): avc: denied { name_connect } for pid=28234 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:56:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x6, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x14) 18:56:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20042600) [ 792.027181] audit: type=1400 audit(1556650601.982:2811): avc: denied { node_bind } for pid=28237 comm="syz-executor.1" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 792.110183] audit: type=1400 audit(1556650601.992:2812): avc: denied { name_connect } for pid=28237 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 792.150855] audit: type=1400 audit(1556650602.091:2813): avc: denied { map } for pid=28252 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 792.183777] audit: type=1400 audit(1556650602.091:2814): avc: denied { map } for pid=28252 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 792.216573] audit: type=1400 audit(1556650602.111:2815): avc: denied { map } for pid=28252 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000000c0)=0x17, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x2000000028) fcntl$setstatus(r0, 0x4, 0x42000) 18:56:42 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000002c0)=0x3f, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0xfffffff}) 18:56:42 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'ip6tnl0\x00'}}, 0x1e) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) 18:56:42 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 18:56:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:42 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20042600) [ 792.248580] audit: type=1400 audit(1556650602.131:2816): avc: denied { map } for pid=28252 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:42 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:42 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000002c0)=0x3f, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0xfffffff}) [ 792.307048] audit: type=1400 audit(1556650602.191:2817): avc: denied { node_bind } for pid=28259 comm="syz-executor.4" saddr=172.20.20.170 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 18:56:42 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'ip6tnl0\x00'}}, 0x1e) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) 18:56:42 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:42 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000002c0)=0x3f, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0xfffffff}) 18:56:42 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'ip6tnl0\x00'}}, 0x1e) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) [ 792.469265] audit: type=1400 audit(1556650602.201:2818): avc: denied { name_connect } for pid=28259 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 18:56:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20042600) 18:56:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000100)='y', 0x1}], 0x1) 18:56:45 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000002c0)=0x3f, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0xfffffff}) 18:56:45 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'ip6tnl0\x00'}}, 0x1e) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) 18:56:45 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000100)='y', 0x1}], 0x1) 18:56:45 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000100)='y', 0x1}], 0x1) 18:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:45 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") inotify_add_watch(r0, &(0x7f0000000780)='./file0\x00', 0xa400295c) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) fchmod(r3, 0x0) 18:56:45 executing program 3: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20042600) 18:56:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000100)='y', 0x1}], 0x1) [ 795.597456] vhci_hcd: default hub control req: 010b v0000 i0000 l0 18:56:45 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:45 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:45 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) [ 795.669437] vhci_hcd: default hub control req: 010b v0000 i0000 l0 18:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:45 executing program 3: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) [ 795.904641] vhci_hcd: default hub control req: 010b v0000 i0000 l0 18:56:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:46 executing program 3: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:46 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:46 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) [ 796.153788] vhci_hcd: default hub control req: 010b v0000 i0000 l0 18:56:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:46 executing program 3: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:46 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) 18:56:46 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, 0x0, 0xfffffffffffffdc3, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file1\x00') mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x1910824, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$key(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)={0x2, 0x13, 0x40, 0xf, 0x1e, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0xfffffffffffffffe, 0x2, 0x58, 0xab9}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_ident={0x2, 0x0, 0x3f, 0x0, 0x8}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e22, 0x20, @loopback, 0x6}, @in={0x2, 0x4e22, @loopback}}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x10, 0x4}, @sadb_address={0x5, 0x17, 0x3c, 0x20, 0x0, @in6={0xa, 0x4e22, 0x0, @local, 0xffffffffffffa9d9}}]}, 0xf0}}, 0x20000004) getsockopt$netlink(r2, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0xbf) [ 796.512248] vhci_hcd: default hub control req: 010b v0000 i0000 l0 18:56:46 executing program 5: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:46 executing program 1: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) 18:56:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000080)={0x2, 0x4}) 18:56:47 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000280)) 18:56:47 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 18:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0x8108551b, &(0x7f0000000180)) ioctl$sock_inet_SIOCRTMSG(r1, 0x80085504, &(0x7f0000000100)={0x0, {0x2, 0x0, @local}}) [ 796.942938] kauditd_printk_skb: 59 callbacks suppressed [ 796.942945] audit: type=1400 audit(1556650607.030:2878): avc: denied { map } for pid=28393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:47 executing program 5: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) [ 797.095190] audit: type=1400 audit(1556650607.070:2879): avc: denied { map } for pid=28393 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:47 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=""/186, 0xba}}], 0x4000000000000e9, 0x2, 0x0) 18:56:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) 18:56:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0x4038ae7a, &(0x7f0000000140)={0x0, 0x0, @ioapic}) 18:56:47 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 797.218248] audit: type=1400 audit(1556650607.070:2880): avc: denied { map } for pid=28393 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 797.234989] warning: process `syz-executor.2' used the obsolete bdflush system call 18:56:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) [ 797.301195] Fix your initscripts? 18:56:47 executing program 5: syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) prctl$PR_MCE_KILL_GET(0x22) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000), 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x102000002) 18:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) 18:56:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) [ 797.378423] audit: type=1400 audit(1556650607.080:2881): avc: denied { map } for pid=28393 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 797.378599] warning: process `syz-executor.2' used the obsolete bdflush system call 18:56:47 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=""/186, 0xba}}], 0x4000000000000e9, 0x2, 0x0) 18:56:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) 18:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) [ 797.533327] Fix your initscripts? [ 797.568576] audit: type=1400 audit(1556650607.090:2882): avc: denied { map } for pid=28393 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) 18:56:47 executing program 5: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:47 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) [ 797.612753] audit: type=1400 audit(1556650607.100:2883): avc: denied { map } for pid=28393 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:47 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=""/186, 0xba}}], 0x4000000000000e9, 0x2, 0x0) 18:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") quotactl(0x201080000104, 0x0, 0x0, 0x0) [ 797.770340] warning: process `syz-executor.2' used the obsolete bdflush system call [ 797.781582] warning: process `syz-executor.4' used the obsolete bdflush system call 18:56:47 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 797.813626] audit: type=1400 audit(1556650607.100:2884): avc: denied { map } for pid=28393 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 797.850341] Fix your initscripts? [ 797.854045] Fix your initscripts? 18:56:48 executing program 3: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000003c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)=""/186, 0xba}}], 0x4000000000000e9, 0x2, 0x0) 18:56:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) 18:56:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) 18:56:48 executing program 5: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 798.010333] audit: type=1400 audit(1556650607.129:2885): avc: denied { map } for pid=28399 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:48 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 798.078230] warning: process `syz-executor.2' used the obsolete bdflush system call [ 798.132985] Fix your initscripts? 18:56:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) 18:56:48 executing program 1: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) close(r1) accept4(r2, 0x0, 0x0, 0x0) close(r1) syz_execute_func(&(0x7f0000000140)="b18691cd808e6b00440f1804e38a20d0d0c44139fd5bf941dea5f909bd1ac7c7e4c653fb0fc4014cb8d79ab2f4405f3ff9f9c401cd147f03d4e1795075a161c48192558dc3c366450f186746c421ed65dac4e1d3d0ce7363df7575f30f108609000000c4ee6d66470f38026e5f520fc226f775734646436140090dd86f04f3d00fc7a004f4e1110f000000dcfe30") capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000cc0000)) socket$netlink(0x10, 0x3, 0x4) [ 798.182354] audit: type=1400 audit(1556650607.258:2886): avc: denied { map } for pid=28410 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:48 executing program 5: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 798.322108] audit: type=1400 audit(1556650607.288:2887): avc: denied { map } for pid=28410 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:48 executing program 3: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:49 executing program 0: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:49 executing program 1: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:49 executing program 3: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:50 executing program 1: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="ab903eb7aa7793d4"], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, 0x0, 0x0) recvmmsg(r3, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}], 0x1, 0x40, &(0x7f00000009c0)={0x0, 0x989680}) lstat(&(0x7f0000000300)='./file0\x00', 0x0) write(0xffffffffffffffff, 0x0, 0x0) 18:56:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000023c0)=""/4096, 0xab0}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 18:56:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f01000000030000000900000000800000010000000500000071000000010000000300000005000000ff0f0000ff7f000001010000000000000900000000100000020000000180000082d9000000000100931f"]}) r1 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x28021) write$evdev(r1, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f00000000c0)=""/65) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 18:56:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0x4, 0x19c3e9d177914dfa) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@random="cd390b081bf2", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x4, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, [], "802a08000000006b"}}}}}}}, 0x0) close(r0) 18:56:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./file0\x00', 0x1124, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20}, 0xfffffc34) read$FUSE(r2, &(0x7f0000002680), 0x1092) 18:56:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:56:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="9bb78de2644356979471bb892b56e3d25590bf1b68f3eb21581a2d9c089a527e86b889e9cebde6a32ddb25d76d98c85873038c869f5ad7929899fdb3b3875326d8d54d1ffe0eb7afe04632682a28933f0b8521f9e619cc6c05451fda79b40c3a2a60696f16525bffefab7198ae8c69af8afcca9dd15b84768dcaebf6cc44db15854437ce7571b31389eef9e0dff9fa8958cdf94ec6f81e484efad911f495ebc969a89232310f9299dc1aa865cd4d370abfdaed0d06ba", 0xb6}], 0x1, 0x0, 0x0, 0x40000}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f00000001c0)=""/214) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) 18:56:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x40000000004, 0x200200) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x2000080, 0x10, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) socket(0x0, 0x80805, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000180)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000200)) openat$vfio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0xc008ae05, &(0x7f0000000080)={0x50}) 18:56:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x40000000004, 0x200200) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x2000080, 0x10, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) socket(0x0, 0x80805, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000180)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000200)) openat$vfio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:56:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_pts(r0, 0x80000000006) r3 = dup3(r2, r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0xfff}) write$UHID_INPUT(r3, &(0x7f0000001640)={0x300, "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", 0x1000}, 0x1006) 18:56:51 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x5) write$9p(r1, &(0x7f0000000280)="ec", 0x1) 18:56:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x1}) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00'}}, 0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x00\x00\x00Jk\x00'}) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2, @dev, 'tunl0\x00'}}, 0x1e) 18:56:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x40000000004, 0x200200) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x2000080, 0x10, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) socket(0x0, 0x80805, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000180)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000200)) openat$vfio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 18:56:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:56:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 18:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00000003c0)='&e$\x81XK%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\xcc\x13\xce\x88\xd7R\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\xcf\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\xfe\xcf\x8b,a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xecV2\b\xf1\xd3\xed\xb7\xc1J-\x1d\x9d\xe1\x96\xc7sP\x00\x00\x00\x00\x00\x00\x00\x00') 18:56:51 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x5) write$9p(r1, &(0x7f0000000280)="ec", 0x1) 18:56:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='GPL\x00', 0x0, 0xc3, &(0x7f0000000240)=""/195}, 0x48) 18:56:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x40000000004, 0x200200) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x2000080, 0x10, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, 0x0, 0xfffffffffffffffd) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) socket(0x0, 0x80805, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000180)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000200)) openat$vfio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 18:56:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x11x\xf4D3A}?\x00\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 18:56:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='GPL\x00', 0x0, 0xc3, &(0x7f0000000240)=""/195}, 0x48) 18:56:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) [ 801.706785] tmpfs: Bad mount option &e$XK%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?ΈR~PqHm34Ih!(.x㝟}'s $O,3ZW5> [ 801.736604] tmpfs: Bad mount option &e$XK%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?ΈR~PqHm34Ih!(.x㝟}'s $O,3ZW5> 18:56:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00000003c0)='&e$\x81XK%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\xcc\x13\xce\x88\xd7R\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\xcf\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\xfe\xcf\x8b,a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xecV2\b\xf1\xd3\xed\xb7\xc1J-\x1d\x9d\xe1\x96\xc7sP\x00\x00\x00\x00\x00\x00\x00\x00') 18:56:51 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x5) write$9p(r1, &(0x7f0000000280)="ec", 0x1) 18:56:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='GPL\x00', 0x0, 0xc3, &(0x7f0000000240)=""/195}, 0x48) 18:56:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="390000001100090469001b00810800000700fd3f03000000450001070000001405001a001500160007009183a8a500bdbb0a9b84e443380200", 0x39}], 0x1) 18:56:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="390000001100090469001b00810800000700fd3f03000000450001070000001405001a001500160007009183a8a500bdbb0a9b84e443380200", 0x39}], 0x1) 18:56:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='GPL\x00', 0x0, 0xc3, &(0x7f0000000240)=""/195}, 0x48) 18:56:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 18:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00000003c0)='&e$\x81XK%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\xcc\x13\xce\x88\xd7R\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\xcf\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\xfe\xcf\x8b,a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xecV2\b\xf1\xd3\xed\xb7\xc1J-\x1d\x9d\xe1\x96\xc7sP\x00\x00\x00\x00\x00\x00\x00\x00') [ 801.941073] tmpfs: Bad mount option &e$XK%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?ΈR~PqHm34Ih!(.x㝟}'s $O,3ZW5> 18:56:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000000000)={0x14, 0x25, 0xafb}, 0x14}}, 0x0) [ 802.002791] kauditd_printk_skb: 80 callbacks suppressed [ 802.002799] audit: type=1400 audit(1556650612.048:2968): avc: denied { map } for pid=28674 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:52 executing program 0: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0x95) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x5) write$9p(r1, &(0x7f0000000280)="ec", 0x1) 18:56:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="390000001100090469001b00810800000700fd3f03000000450001070000001405001a001500160007009183a8a500bdbb0a9b84e443380200", 0x39}], 0x1) 18:56:52 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x200000000000000f) gettid() openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000200)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 18:56:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYRES16], 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000040)={0x8, 0x27ffff}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 802.100312] audit: type=1400 audit(1556650612.058:2969): avc: denied { map } for pid=28680 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="390000001100090469001b00810800000700fd3f03000000450001070000001405001a001500160007009183a8a500bdbb0a9b84e443380200", 0x39}], 0x1) 18:56:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000000000)={0x14, 0x25, 0xafb}, 0x14}}, 0x0) 18:56:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000180)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 18:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, &(0x7f00000003c0)='&e$\x81XK%\xd7\xe4\x9c\xe3\xc1\x99\x8e/}iR\xd5\v@Z\xe1\xd8\xe8\v\xe6\x87\x93\xd2a6Z\xd3AO%\xda\xdb\xfb$\x0f\xb9\x1fQw.HOo-\xca_\xca\xff\xfe\x85\x1c\xeb$\xbb\x0f\xa5Z@]\xadt;\xf3\x95\x89(|\x9e\xb8C\x896\xdb\x89\r\xe0})D\xee\x7f\x92\xf2\x82\xe3C?\xcc\x13\xce\x88\xd7R\x10\x87~\xa5\xff\x1bP\xefqH\x80\xf0m\x19\xec\x12\x10\xe6\x163\a4I\x94h!(\x19.\xbc\xadx\a\x83\xb4\x98\xe3\x9d\x9f\x1e}\'\xcc\xf5s\x82\v\xa8\xb2\xc4\xf5$\x18O,3\xecZ\x8eW5\xef\xfe>\xd9=#\x11\xc1rys\x81\x80\x9b\xfd\xbc\xad\x17A\xae\xfd\x11\x1d\x9b\xf7\xcf\x01\\\xbb\xd1r\xbbq\xb0\xdf\x1e\xc7\xdb\xc1\x89\xec\x12A\xce\xd4-Q[\xea!\\\n.\xc4H\xc4\xe1\xf6\x01>\x01\xaa]\xfb\x8c\x05\xcf\x9ah\xf8\xdd (\xe5\x86-N\xb3Dp\x1f`/\xc9\xe2\rE>\xc9I\\\x10\x91\x1f\x80\xde\xd7\xd2\xce\xdf@\xdb)Ub\x9dHe\x8c\x1d\xfe\xcf\x8b,a`\x9b\xa5\xf8\xf1B\xacT,)\xc2\xa4\xa9\xe8\x92H\x88\xff\a\x00\x00\x00\x00\x00\x00\xc6\xbf\xe7`6\xce$\xda6\xf0\x15\x7f\xfe\xb9\x90\xc3\x1d\xf9\x1d\xfbZ\xecV2\b\xf1\xd3\xed\xb7\xc1J-\x1d\x9d\xe1\x96\xc7sP\x00\x00\x00\x00\x00\x00\x00\x00') [ 802.179475] tmpfs: Bad mount option &e$XK%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?ΈR~PqHm34Ih!(.x㝟}'s $O,3ZW5> 18:56:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0xc1004111, 0x0) 18:56:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYRES16], 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000040)={0x8, 0x27ffff}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 802.277047] audit: type=1400 audit(1556650612.316:2970): avc: denied { map } for pid=28701 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:52 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) connect$inet6(r0, 0x0, 0x1b5) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_read_part_table(0x0, 0xaaaaaaaaaaaab9e, &(0x7f0000000000)) 18:56:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYRES16], 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000040)={0x8, 0x27ffff}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 18:56:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000001, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000040)={0x0, 0x0, 0x4, {0x3, @vbi}}) [ 802.370966] tmpfs: Bad mount option &e$XK%/}iR @Z 懓a6ZAO%$Qw.HOo-_$Z@]t;(|C6ۉ })DC?ΈR~PqHm34Ih!(.x㝟}'s $O,3ZW5> [ 802.427650] audit: type=1400 audit(1556650612.326:2971): avc: denied { map } for pid=28701 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000000000)={0x14, 0x25, 0xafb}, 0x14}}, 0x0) 18:56:52 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x8012, r0, 0x0) read(r0, 0x0, 0x0) 18:56:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) flock(r0, 0x3) [ 802.474909] audit: type=1400 audit(1556650612.504:2972): avc: denied { create } for pid=28714 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:56:52 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[@ANYRES16], 0x2) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000040)={0x8, 0x27ffff}) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 18:56:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000000000)={0x14, 0x25, 0xafb}, 0x14}}, 0x0) 18:56:52 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000800000001) unshare(0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_proto_private(r0, 0x89e1, 0x0) [ 802.607346] audit: type=1400 audit(1556650612.514:2973): avc: denied { write } for pid=28714 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 18:56:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000180)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 18:56:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) flock(r0, 0x3) 18:56:52 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8601, 0x0) write$rfkill(r0, 0x0, 0xe60a) [ 802.687071] audit: type=1400 audit(1556650612.514:2974): avc: denied { read } for pid=28714 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 802.788761] audit: type=1400 audit(1556650612.584:2975): avc: denied { map } for pid=28724 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.819255] audit: type=1400 audit(1556650612.594:2976): avc: denied { map } for pid=28724 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 802.846212] audit: type=1400 audit(1556650612.603:2977): avc: denied { map } for pid=28724 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 18:56:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000800000001) unshare(0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_proto_private(r0, 0x89e1, 0x0) 18:56:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 18:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 18:56:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) flock(r0, 0x3) 18:56:53 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) connect$inet6(r0, 0x0, 0x1b5) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_read_part_table(0x0, 0xaaaaaaaaaaaab9e, &(0x7f0000000000)) 18:56:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000180)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) 18:56:53 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) connect$inet6(r0, 0x0, 0x1b5) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_read_part_table(0x0, 0xaaaaaaaaaaaab9e, &(0x7f0000000000)) 18:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 18:56:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000800000001) unshare(0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_proto_private(r0, 0x89e1, 0x0) 18:56:53 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) flock(r0, 0x3) 18:56:53 executing program 5: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="020900000200000000c47dd31b650aad"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000007000006000000000000060000800000000000e00000010b00000000000000000035000000000000000000000000ff00000000030006000000000002000004000000bb000000000000000003000500000000000200423b000000000000004000000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000480)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000580)={{0x3, 0x0, 0x4, 0xfb3, '\x00', 0x82b}, 0x1, 0x0, 0x1000, r3, 0x0, 0x9, 'syz0\x00', 0x0, 0x0, [], [0x9, 0x96, 0x0, 0x8001]}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_LSEEK(r4, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000080)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:56:53 executing program 3: r0 = socket$inet(0x2, 0x3, 0x800000800000001) unshare(0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_proto_private(r0, 0x89e1, 0x0) 18:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 18:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127c, &(0x7f0000000080)) 18:56:53 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) connect$inet6(r0, 0x0, 0x1b5) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') syz_read_part_table(0x0, 0xaaaaaaaaaaaab9e, &(0x7f0000000000)) 18:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c10000000000001400000", 0x58}], 0x1) 18:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127c, &(0x7f0000000080)) 18:56:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000180)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x21020017ec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040), 0x4) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$poke(0x4209, r2, &(0x7f00000000c0), 0x0) [ 1007.207254] INFO: task syz-executor.4:8489 blocked for more than 140 seconds. [ 1007.215036] Not tainted 4.14.114 #4 [ 1007.219703] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1007.228045] syz-executor.4 D24992 8489 1 0x00000004 [ 1007.233816] Call Trace: [ 1007.236457] __schedule+0x7be/0x1cf0 [ 1007.240344] ? __mutex_lock+0x737/0x1470 [ 1007.244484] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1007.249856] schedule+0x92/0x1c0 [ 1007.253622] schedule_preempt_disabled+0x13/0x20 [ 1007.258731] __mutex_lock+0x73c/0x1470 [ 1007.262751] ? lo_ioctl+0x87/0x1c70 [ 1007.266407] ? lock_downgrade+0x621/0x6e0 [ 1007.270640] ? mutex_trylock+0x1c0/0x1c0 [ 1007.274830] ? avc_has_extended_perms+0x8ec/0xe40 [ 1007.279782] ? putname+0xdb/0x120 [ 1007.283661] ? avc_ss_reset+0x110/0x110 [ 1007.288175] ? kasan_slab_free+0x75/0xc0 [ 1007.293186] mutex_lock_nested+0x16/0x20 [ 1007.297664] ? mutex_lock_nested+0x16/0x20 [ 1007.302684] lo_ioctl+0x87/0x1c70 [ 1007.307103] ? loop_probe+0x160/0x160 [ 1007.312046] blkdev_ioctl+0x983/0x1880 [ 1007.316488] ? blkpg_ioctl+0x980/0x980 [ 1007.320664] ? __might_sleep+0x93/0xb0 [ 1007.324919] block_ioctl+0xde/0x120 [ 1007.329411] ? blkdev_fallocate+0x3b0/0x3b0 [ 1007.333927] do_vfs_ioctl+0x7b9/0x1070 [ 1007.338033] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1007.343296] ? ioctl_preallocate+0x1c0/0x1c0 [ 1007.348502] ? putname+0xe0/0x120 [ 1007.352945] ? do_sys_open+0x221/0x430 [ 1007.358659] ? security_file_ioctl+0x83/0xc0 [ 1007.363269] ? security_file_ioctl+0x8f/0xc0 [ 1007.367775] SyS_ioctl+0x8f/0xc0 [ 1007.371262] ? do_vfs_ioctl+0x1070/0x1070 [ 1007.375594] do_syscall_64+0x1eb/0x630 [ 1007.379678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.384685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1007.390088] RIP: 0033:0x458c17 [ 1007.393494] RSP: 002b:00007ffc153d5668 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1007.401539] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c17 [ 1007.408880] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 1007.416430] RBP: 0000000000000a3b R08: 0000000000000000 R09: 000000000000000a [ 1007.424266] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 1007.432084] R13: 00007ffc153d56a0 R14: 00000000000c3121 R15: 00007ffc153d56b0 [ 1007.440233] INFO: task syz-executor.1:18170 blocked for more than 140 seconds. [ 1007.447605] Not tainted 4.14.114 #4 [ 1007.453320] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1007.461832] syz-executor.1 D25168 18170 18169 0x00000000 [ 1007.468035] Call Trace: [ 1007.470956] __schedule+0x7be/0x1cf0 [ 1007.474691] ? __mutex_lock+0x737/0x1470 [ 1007.478862] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1007.484067] schedule+0x92/0x1c0 [ 1007.487500] schedule_preempt_disabled+0x13/0x20 [ 1007.492604] __mutex_lock+0x73c/0x1470 [ 1007.496683] ? trace_hardirqs_on+0x10/0x10 [ 1007.501528] ? lo_open+0x1d/0xb0 [ 1007.505177] ? refcount_add+0x40/0x50 [ 1007.509373] ? mutex_trylock+0x1c0/0x1c0 [ 1007.513448] ? find_held_lock+0x35/0x130 [ 1007.517759] ? disk_get_part+0x9c/0x140 [ 1007.521969] ? lock_downgrade+0x6e0/0x6e0 [ 1007.526176] ? loop_unregister_transfer+0x90/0x90 [ 1007.531441] mutex_lock_nested+0x16/0x20 [ 1007.535565] ? mutex_lock_nested+0x16/0x20 [ 1007.540556] lo_open+0x1d/0xb0 [ 1007.543757] __blkdev_get+0x2c9/0x1120 [ 1007.547660] ? __blkdev_put+0x7f0/0x7f0 [ 1007.551912] ? bd_acquire+0x178/0x2c0 [ 1007.555723] ? find_held_lock+0x35/0x130 [ 1007.560237] blkdev_get+0xa8/0x8e0 [ 1007.564130] ? bd_may_claim+0xd0/0xd0 [ 1007.568142] ? _raw_spin_unlock+0x2d/0x50 [ 1007.572625] blkdev_open+0x1d1/0x260 [ 1007.576788] ? security_file_open+0x8f/0x1a0 [ 1007.581387] do_dentry_open+0x73e/0xeb0 [ 1007.585381] ? bd_acquire+0x2c0/0x2c0 [ 1007.589389] vfs_open+0x105/0x230 [ 1007.592918] path_openat+0x8bd/0x3f70 [ 1007.597170] ? trace_hardirqs_on+0x10/0x10 [ 1007.601491] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1007.607366] ? find_held_lock+0x35/0x130 [ 1007.611549] ? __alloc_fd+0x1d4/0x4a0 [ 1007.615617] do_filp_open+0x18e/0x250 [ 1007.619449] ? may_open_dev+0xe0/0xe0 [ 1007.623494] ? _raw_spin_unlock+0x2d/0x50 [ 1007.627656] ? __alloc_fd+0x1d4/0x4a0 [ 1007.631570] do_sys_open+0x2c5/0x430 [ 1007.635416] ? filp_open+0x70/0x70 [ 1007.640313] SyS_open+0x2d/0x40 [ 1007.644070] ? do_sys_open+0x430/0x430 [ 1007.648709] do_syscall_64+0x1eb/0x630 [ 1007.654090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.659288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1007.664698] RIP: 0033:0x412d20 [ 1007.668137] RSP: 002b:00007ffe50d066d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1007.678044] RAX: ffffffffffffffda RBX: 00000000000c33d2 RCX: 0000000000412d20 [ 1007.687877] RDX: 00007ffe50d0676a RSI: 0000000000000002 RDI: 00007ffe50d06760 [ 1007.696271] RBP: 00000000000005d6 R08: 0000000000000000 R09: 000000000000000a [ 1007.704031] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 1007.711382] R13: 00007ffe50d06710 R14: 00000000000c335e R15: 00007ffe50d06720 [ 1007.719578] INFO: task syz-executor.2:28769 blocked for more than 140 seconds. [ 1007.727448] Not tainted 4.14.114 #4 [ 1007.731851] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1007.760642] syz-executor.2 D26672 28769 7019 0x00000004 [ 1007.766891] Call Trace: [ 1007.769586] __schedule+0x7be/0x1cf0 [ 1007.773812] ? __mutex_lock+0x737/0x1470 [ 1007.778601] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1007.784209] schedule+0x92/0x1c0 [ 1007.787943] schedule_preempt_disabled+0x13/0x20 [ 1007.794449] __mutex_lock+0x73c/0x1470 [ 1007.799403] ? trace_hardirqs_on+0x10/0x10 [ 1007.803752] ? lo_open+0x1d/0xb0 [ 1007.807196] ? refcount_add+0x40/0x50 [ 1007.811124] ? mutex_trylock+0x1c0/0x1c0 [ 1007.815411] ? find_held_lock+0x35/0x130 [ 1007.822663] ? disk_get_part+0x9c/0x140 [ 1007.827483] ? lock_downgrade+0x6e0/0x6e0 [ 1007.832348] ? loop_unregister_transfer+0x90/0x90 [ 1007.837465] mutex_lock_nested+0x16/0x20 [ 1007.841535] ? mutex_lock_nested+0x16/0x20 [ 1007.845981] lo_open+0x1d/0xb0 [ 1007.849203] __blkdev_get+0x2c9/0x1120 [ 1007.853409] ? __blkdev_put+0x7f0/0x7f0 [ 1007.857715] ? bd_acquire+0x178/0x2c0 [ 1007.861693] ? find_held_lock+0x35/0x130 [ 1007.866111] blkdev_get+0xa8/0x8e0 [ 1007.869797] ? bd_may_claim+0xd0/0xd0 [ 1007.874626] ? _raw_spin_unlock+0x2d/0x50 [ 1007.879074] blkdev_open+0x1d1/0x260 [ 1007.882854] ? security_file_open+0x8f/0x1a0 [ 1007.887430] do_dentry_open+0x73e/0xeb0 [ 1007.892007] ? bd_acquire+0x2c0/0x2c0 [ 1007.896002] vfs_open+0x105/0x230 [ 1007.899513] path_openat+0x8bd/0x3f70 [ 1007.903729] ? trace_hardirqs_on+0x10/0x10 [ 1007.908715] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1007.913662] ? find_held_lock+0x35/0x130 [ 1007.917884] ? __alloc_fd+0x1d4/0x4a0 [ 1007.921685] do_filp_open+0x18e/0x250 [ 1007.930141] ? may_open_dev+0xe0/0xe0 [ 1007.934818] ? _raw_spin_unlock+0x2d/0x50 [ 1007.939397] ? __alloc_fd+0x1d4/0x4a0 [ 1007.943483] do_sys_open+0x2c5/0x430 [ 1007.947518] ? filp_open+0x70/0x70 [ 1007.951047] ? fput+0xd4/0x150 [ 1007.954464] ? SyS_pwrite64+0xca/0x140 [ 1007.960185] SyS_open+0x2d/0x40 [ 1007.964791] ? do_sys_open+0x430/0x430 [ 1007.969404] do_syscall_64+0x1eb/0x630 [ 1007.973853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.979102] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1007.984774] RIP: 0033:0x412d41 [ 1007.990259] RSP: 002b:00007f777e50f9f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1007.998408] RAX: ffffffffffffffda RBX: 00007f777e5106d4 RCX: 0000000000412d41 [ 1008.008466] RDX: 00007f777e50fbaa RSI: 0000000000000002 RDI: 00007f777e50fba0 [ 1008.016747] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 1008.024177] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1008.031521] R13: 0000000000000004 R14: 00007f777e5106d4 R15: 00000000ffffffff [ 1008.038915] INFO: task syz-executor.0:28799 blocked for more than 140 seconds. [ 1008.046340] Not tainted 4.14.114 #4 [ 1008.050572] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1008.058865] syz-executor.0 D26960 28799 8491 0x00000004 [ 1008.064803] Call Trace: [ 1008.067533] __schedule+0x7be/0x1cf0 [ 1008.071264] ? __mutex_lock+0x737/0x1470 [ 1008.075492] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1008.080620] schedule+0x92/0x1c0 [ 1008.084001] schedule_preempt_disabled+0x13/0x20 [ 1008.088949] __mutex_lock+0x73c/0x1470 [ 1008.092842] ? blkdev_reread_part+0x1f/0x40 [ 1008.097560] ? mutex_trylock+0x1c0/0x1c0 [ 1008.101727] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1008.107371] ? __wake_up_common_lock+0xe3/0x160 [ 1008.112193] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1008.117451] mutex_lock_nested+0x16/0x20 [ 1008.121632] ? mutex_lock_nested+0x16/0x20 [ 1008.125948] blkdev_reread_part+0x1f/0x40 [ 1008.130813] loop_reread_partitions+0x7c/0x90 [ 1008.136000] loop_clr_fd+0x844/0xae0 [ 1008.139726] lo_ioctl+0x8d0/0x1c70 [ 1008.143356] ? __check_object_size+0x12a/0x2ab [ 1008.148090] ? loop_probe+0x160/0x160 [ 1008.151894] blkdev_ioctl+0x983/0x1880 [ 1008.155895] ? blkpg_ioctl+0x980/0x980 [ 1008.160036] block_ioctl+0xde/0x120 [ 1008.163660] ? blkdev_fallocate+0x3b0/0x3b0 [ 1008.168332] do_vfs_ioctl+0x7b9/0x1070 [ 1008.172386] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1008.177245] ? lock_downgrade+0x6e0/0x6e0 [ 1008.181687] ? ioctl_preallocate+0x1c0/0x1c0 [ 1008.186536] ? __fget+0x237/0x370 [ 1008.190099] ? security_file_ioctl+0x8f/0xc0 [ 1008.195858] SyS_ioctl+0x8f/0xc0 [ 1008.199252] ? do_vfs_ioctl+0x1070/0x1070 [ 1008.203844] do_syscall_64+0x1eb/0x630 [ 1008.207823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.212905] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1008.218203] RIP: 0033:0x458c17 [ 1008.221398] RSP: 002b:00007f1b23a849f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.229443] RAX: ffffffffffffffda RBX: 00007f1b23a856d4 RCX: 0000000000458c17 [ 1008.236865] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 1008.244495] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 1008.252104] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 1008.259818] R13: 0000000000000000 R14: 0000000000000005 R15: 00000000ffffffff [ 1008.267351] INFO: task syz-executor.3:28802 blocked for more than 140 seconds. [ 1008.274713] Not tainted 4.14.114 #4 [ 1008.279192] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1008.287591] syz-executor.3 D28944 28802 7020 0x00000004 [ 1008.293220] Call Trace: [ 1008.295892] __schedule+0x7be/0x1cf0 [ 1008.299614] ? __mutex_lock+0x737/0x1470 [ 1008.303735] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1008.308891] schedule+0x92/0x1c0 [ 1008.312330] schedule_preempt_disabled+0x13/0x20 [ 1008.317243] __mutex_lock+0x73c/0x1470 [ 1008.321263] ? trace_hardirqs_on+0x10/0x10 [ 1008.325567] ? lo_release+0x84/0x1b0 [ 1008.329448] ? save_trace+0x250/0x290 [ 1008.333260] ? mutex_trylock+0x1c0/0x1c0 [ 1008.337846] ? __blkdev_put+0x397/0x7f0 [ 1008.342080] ? find_held_lock+0x35/0x130 [ 1008.346641] ? __blkdev_put+0x397/0x7f0 [ 1008.351346] ? loop_clr_fd+0xae0/0xae0 [ 1008.355345] mutex_lock_nested+0x16/0x20 [ 1008.359514] ? mutex_lock_nested+0x16/0x20 [ 1008.363756] lo_release+0x84/0x1b0 [ 1008.367373] ? loop_clr_fd+0xae0/0xae0 [ 1008.371387] __blkdev_put+0x436/0x7f0 [ 1008.375452] ? bd_set_size+0xb0/0xb0 [ 1008.379251] ? wait_for_completion+0x420/0x420 [ 1008.384041] blkdev_put+0x88/0x510 [ 1008.387765] ? fcntl_setlk+0xb90/0xb90 [ 1008.391659] ? blkdev_put+0x510/0x510 [ 1008.396099] blkdev_close+0x8b/0xb0 [ 1008.400081] __fput+0x277/0x7a0 [ 1008.403469] ____fput+0x16/0x20 [ 1008.406904] task_work_run+0x119/0x190 [ 1008.410799] exit_to_usermode_loop+0x1da/0x220 [ 1008.415638] do_syscall_64+0x4a9/0x630 [ 1008.419598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.424635] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1008.429893] RIP: 0033:0x412b61 [ 1008.433093] RSP: 002b:00007ffc81cfa490 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1008.440878] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000412b61 [ 1008.448372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1008.455873] RBP: 0000000000000001 R08: 000000008129893e R09: ffffffffffffffff [ 1008.463341] R10: 00007ffc81cfa570 R11: 0000000000000293 R12: 0000000000740328 [ 1008.470773] R13: 00000000000c33e6 R14: 00000000000c3413 R15: 000000000073bf0c [ 1008.479230] INFO: task blkid:28803 blocked for more than 140 seconds. [ 1008.485966] Not tainted 4.14.114 #4 [ 1008.490187] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1008.498534] blkid D28080 28803 21413 0x00000004 [ 1008.504291] Call Trace: [ 1008.506938] __schedule+0x7be/0x1cf0 [ 1008.511200] ? __mutex_lock+0x737/0x1470 [ 1008.515276] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1008.520705] schedule+0x92/0x1c0 [ 1008.524571] schedule_preempt_disabled+0x13/0x20 [ 1008.529565] __mutex_lock+0x73c/0x1470 [ 1008.533472] ? lo_ioctl+0x87/0x1c70 [ 1008.537498] ? lock_downgrade+0x620/0x6e0 [ 1008.542155] ? mutex_trylock+0x1c0/0x1c0 [ 1008.546326] ? avc_has_extended_perms+0x8ec/0xe40 [ 1008.551627] ? __might_fault+0x110/0x1d0 [ 1008.555894] ? avc_ss_reset+0x110/0x110 [ 1008.560109] mutex_lock_nested+0x16/0x20 [ 1008.564287] ? mutex_lock_nested+0x16/0x20 [ 1008.568710] lo_ioctl+0x87/0x1c70 [ 1008.572176] ? loop_probe+0x160/0x160 [ 1008.576152] blkdev_ioctl+0x983/0x1880 [ 1008.580139] ? blkpg_ioctl+0x980/0x980 [ 1008.584054] ? __might_sleep+0x93/0xb0 [ 1008.587992] ? save_trace+0x290/0x290 [ 1008.591924] block_ioctl+0xde/0x120 [ 1008.597354] ? blkdev_fallocate+0x3b0/0x3b0 [ 1008.601866] do_vfs_ioctl+0x7b9/0x1070 [ 1008.605994] ? selinux_file_mprotect+0x5d0/0x5d0 [ 1008.610879] ? check_preemption_disabled+0x3c/0x250 [ 1008.616211] ? ioctl_preallocate+0x1c0/0x1c0 [ 1008.620703] ? check_preemption_disabled+0x20b/0x250 [ 1008.625827] ? perf_swevent_put_recursion_context+0x1f/0xa0 [ 1008.631865] ? __perf_sw_event+0x62/0x90 [ 1008.636036] ? security_file_ioctl+0x83/0xc0 [ 1008.640776] ? security_file_ioctl+0x8f/0xc0 [ 1008.645349] SyS_ioctl+0x8f/0xc0 [ 1008.648885] ? do_vfs_ioctl+0x1070/0x1070 [ 1008.653138] do_syscall_64+0x1eb/0x630 [ 1008.657042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.662078] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1008.667560] RIP: 0033:0x7f0fb6937347 [ 1008.671584] RSP: 002b:00007fff39b25668 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1008.679989] RAX: ffffffffffffffda RBX: 0000000001c16030 RCX: 00007f0fb6937347 [ 1008.687370] RDX: 0000000000000000 RSI: 0000000000005331 RDI: 0000000000000003 [ 1008.694952] RBP: 0000000000000003 R08: 00007f0fb6be75a0 R09: 0000000000000008 [ 1008.702770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1008.710410] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 1008.718753] INFO: task blkid:28807 blocked for more than 140 seconds. [ 1008.725742] Not tainted 4.14.114 #4 [ 1008.729943] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1008.738055] blkid D27960 28807 21504 0x00000004 [ 1008.743927] Call Trace: [ 1008.746622] __schedule+0x7be/0x1cf0 [ 1008.750540] ? __mutex_lock+0x737/0x1470 [ 1008.754711] ? pci_mmcfg_check_reserved+0x150/0x150 [ 1008.760011] schedule+0x92/0x1c0 [ 1008.763509] schedule_preempt_disabled+0x13/0x20 [ 1008.768326] __mutex_lock+0x73c/0x1470 [ 1008.772358] ? lo_open+0x1d/0xb0 [ 1008.775837] ? refcount_add+0x40/0x50 [ 1008.780081] ? mutex_trylock+0x1c0/0x1c0 [ 1008.784256] ? exact_match+0xd/0x20 [ 1008.788045] ? kobj_lookup+0x319/0x410 [ 1008.792045] ? loop_unregister_transfer+0x90/0x90 [ 1008.796958] mutex_lock_nested+0x16/0x20 [ 1008.801394] ? mutex_lock_nested+0x16/0x20 [ 1008.806018] lo_open+0x1d/0xb0 [ 1008.809216] __blkdev_get+0xab1/0x1120 [ 1008.813164] ? __blkdev_put+0x7f0/0x7f0 [ 1008.817161] ? bd_acquire+0x178/0x2c0 [ 1008.821541] ? find_held_lock+0x35/0x130 [ 1008.825712] blkdev_get+0xa8/0x8e0 [ 1008.829376] ? bd_may_claim+0xd0/0xd0 [ 1008.833391] ? _raw_spin_unlock+0x2d/0x50 [ 1008.837550] blkdev_open+0x1d1/0x260 [ 1008.841453] ? security_file_open+0x8f/0x1a0 [ 1008.845960] do_dentry_open+0x73e/0xeb0 [ 1008.849984] ? bd_acquire+0x2c0/0x2c0 [ 1008.853883] vfs_open+0x105/0x230 [ 1008.857441] path_openat+0x8bd/0x3f70 [ 1008.861470] ? trace_hardirqs_on+0x10/0x10 [ 1008.866193] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 1008.870937] ? find_held_lock+0x35/0x130 [ 1008.875099] ? __alloc_fd+0x1d4/0x4a0 [ 1008.878995] do_filp_open+0x18e/0x250 [ 1008.882917] ? may_open_dev+0xe0/0xe0 [ 1008.887430] ? _raw_spin_unlock+0x2d/0x50 [ 1008.891751] ? __alloc_fd+0x1d4/0x4a0 [ 1008.895716] do_sys_open+0x2c5/0x430 [ 1008.899780] ? filp_open+0x70/0x70 [ 1008.903431] SyS_open+0x2d/0x40 [ 1008.906914] ? do_sys_open+0x430/0x430 [ 1008.910808] do_syscall_64+0x1eb/0x630 [ 1008.914836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.921240] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1008.926790] RIP: 0033:0x7fbf2a0e9120 [ 1008.930648] RSP: 002b:00007ffc61830a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1008.938585] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbf2a0e9120 [ 1008.946077] RDX: 00007ffc61831f40 RSI: 0000000000000000 RDI: 00007ffc61831f40 [ 1008.953539] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 1008.961599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002184030 [ 1008.968875] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 1008.976964] [ 1008.976964] Showing all locks held in the system: [ 1008.983607] 1 lock held by khungtaskd/1007: [ 1008.988380] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 1008.997705] 2 locks held by getty/6968: [ 1009.001903] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.010730] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.020817] 2 locks held by getty/6969: [ 1009.024874] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.033905] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.043563] 2 locks held by getty/6970: [ 1009.047531] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.056309] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.065758] 2 locks held by getty/6971: [ 1009.069820] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.078995] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.089132] 2 locks held by getty/6972: [ 1009.093339] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.102033] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.111845] 2 locks held by getty/6973: [ 1009.115852] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.124609] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.134932] 2 locks held by getty/6974: [ 1009.138992] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 1009.148220] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 1009.157774] 1 lock held by syz-executor.4/8489: [ 1009.163121] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 1009.171516] 2 locks held by syz-executor.1/18170: [ 1009.176511] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 1009.185614] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 1009.194150] 2 locks held by syz-executor.2/28769: [ 1009.198996] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 1009.208032] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 1009.216161] 2 locks held by syz-executor.0/28799: [ 1009.221009] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 1009.229415] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 1009.238790] 3 locks held by syz-executor.3/28802: [ 1009.243889] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 1009.252839] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x1e/0x1b0 [ 1009.261811] #2: (loop_ctl_mutex#2){+.+.}, at: [] lo_release+0x84/0x1b0 [ 1009.270443] 1 lock held by blkid/28803: [ 1009.274455] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 1009.283359] 2 locks held by blkid/28807: [ 1009.287575] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 1009.296896] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 1009.305329] [ 1009.306958] ============================================= [ 1009.306958] [ 1009.314321] NMI backtrace for cpu 1 [ 1009.318067] CPU: 1 PID: 1007 Comm: khungtaskd Not tainted 4.14.114 #4 [ 1009.325099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.335013] Call Trace: [ 1009.337597] dump_stack+0x138/0x19c [ 1009.341229] nmi_cpu_backtrace.cold+0x57/0x94 [ 1009.346192] ? irq_force_complete_move.cold+0x7d/0x7d [ 1009.351434] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 1009.356802] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1009.362201] watchdog+0x5e7/0xb90 [ 1009.365666] kthread+0x31c/0x430 [ 1009.369117] ? hungtask_pm_notify+0x60/0x60 [ 1009.373627] ? kthread_create_on_node+0xd0/0xd0 [ 1009.378391] ret_from_fork+0x3a/0x50 [ 1009.382520] Sending NMI from CPU 1 to CPUs 0: [ 1009.387479] NMI backtrace for cpu 0 [ 1009.387482] CPU: 0 PID: 22 Comm: kworker/u4:1 Not tainted 4.14.114 #4 [ 1009.387486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.387488] Workqueue: bat_events batadv_nc_worker [ 1009.387493] task: ffff8880a9e425c0 task.stack: ffff8880a9e48000 [ 1009.387495] RIP: 0010:trace_hardirqs_on+0x0/0x10 [ 1009.387497] RSP: 0018:ffff8880a9e4fc28 EFLAGS: 00000097 [ 1009.387502] RAX: 0000000080000001 RBX: 0000000000000201 RCX: 0000000000000000 [ 1009.387504] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000001 [ 1009.387507] RBP: ffff8880a9e4fc40 R08: 0000000000000001 R09: 0000000000000002 [ 1009.387510] R10: 0000000000000000 R11: ffff8880a9e425c0 R12: ffffffff86034dc5 [ 1009.387513] R13: dffffc0000000000 R14: ffffffff86035620 R15: ffff8880723196c0 [ 1009.387516] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 1009.387518] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1009.387521] CR2: 000000c421883000 CR3: 000000008b583000 CR4: 00000000001426f0 [ 1009.387524] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1009.387527] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1009.387529] Call Trace: [ 1009.387531] ? __local_bh_enable_ip+0x99/0x1a0 [ 1009.387533] _raw_spin_unlock_bh+0x31/0x40 [ 1009.387535] batadv_nc_purge_paths+0x245/0x350 [ 1009.387537] ? lock_downgrade+0x6e0/0x6e0 [ 1009.387539] batadv_nc_worker+0x23d/0x6d0 [ 1009.387541] process_one_work+0x868/0x1610 [ 1009.387543] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 1009.387545] worker_thread+0x5d9/0x1050 [ 1009.387547] kthread+0x31c/0x430 [ 1009.387549] ? process_one_work+0x1610/0x1610 [ 1009.387551] ? kthread_create_on_node+0xd0/0xd0 [ 1009.387553] ret_from_fork+0x3a/0x50 [ 1009.387555] Code: e8 96 a3 3e 00 eb b8 48 c7 c7 a0 e4 24 89 e8 88 a3 3e 00 e9 63 fe ff ff 48 c7 c7 a0 e4 24 89 e8 77 a3 3e 00 e9 ba fe ff ff 66 90 <55> 48 89 e5 48 8b 7d 08 e8 63 fa ff ff 5d c3 90 55 48 89 e5 41 [ 1009.388252] Kernel panic - not syncing: hung_task: blocked tasks [ 1009.593186] CPU: 1 PID: 1007 Comm: khungtaskd Not tainted 4.14.114 #4 [ 1009.600931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.610471] Call Trace: [ 1009.613078] dump_stack+0x138/0x19c [ 1009.616694] panic+0x1f2/0x438 [ 1009.619879] ? add_taint.cold+0x16/0x16 [ 1009.624109] ? irq_force_complete_move.cold+0x7d/0x7d [ 1009.629823] watchdog+0x5f8/0xb90 [ 1009.633441] kthread+0x31c/0x430 [ 1009.636793] ? hungtask_pm_notify+0x60/0x60 [ 1009.641190] ? kthread_create_on_node+0xd0/0xd0 [ 1009.645895] ret_from_fork+0x3a/0x50 [ 1009.651443] Kernel Offset: disabled [ 1009.655078] Rebooting in 86400 seconds..