, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x20800, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x10, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) 14:00:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}) close(r2) close(r1) 14:00:42 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = syz_open_pts(0xffffffffffffff9c, 0x80) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000000040)={0x87, 0x80000001, 0xa7, 0x5, 0x10, 0x200}) ioctl$VT_SETMODE(r2, 0x5602, 0x0) close(r1) close(r1) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="3f0000000100d936c6861b317934c1b6c9e60463cd6a3049da6c72ed97a5fbc3f2c59cfad7bbe763b251f23a7855d879d9d13cdb83b39628c6c35c70bcf28b6deaef1c9b65416a7256e49e840984483db8751caa7196721638ef7ebda4825d352e341bfa2444ba9b4816d9c3d2951c20768ad62325c5e8e808e0fdea92e825899a8687022301c49f1ee684bac550c010276656c66b632695a506f1cb33ebaa1856dd1f14670b1a37e7efd7c7ba8565c262ba8c5a9288a321f0588ec0a71a2228ac21b1382694a7a5c5c482fad4f743cd8c53ebeb1c55230d8cdc3e73f16a4d565b056ae44f8c89a7d7dbe9e9ebb64a06ce1c56834e6ceb"]) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:00:42 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x2, 0x4) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:00:42 executing program 3: set_mempolicy(0x1, 0x0, 0x0) io_setup(0x9, &(0x7f00000002c0)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000040)) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000080)) 14:00:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc42000000000000000900000800000900de56b5000000000800000003080008000100000008000500ac14141b080003"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00ff04462019d9476a04"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') preadv(r0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000100)=""/34, 0x22}], 0x2, 0x0) 14:01:41 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000080)) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) write$vnet(r1, &(0x7f00000002c0)={0x1, {&(0x7f0000000180)=""/233, 0xe9, &(0x7f0000000280)=""/55, 0x3, 0x3}}, 0x68) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x5) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000340)) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000380)={0xdcc9, 0x41323151, 0x2, @stepwise={0x1000, 0x653036a4, 0x1, 0x101, 0x1}}) socket$caif_seqpacket(0x25, 0x5, 0x3) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f00000003c0)) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000440)={0xc2ff, 0x2}) fcntl$getownex(r0, 0x10, &(0x7f0000000480)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000006c0)={r3, r4, r5}, 0xc) write$P9_RLOCK(r1, &(0x7f0000000700)={0x8, 0x35, 0x2, 0x1}, 0x8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x93, 0x1, 0xf, 0x1, "525262d319e8805deef8473fb3d8e085fbd37b6a0bdd34cdfa2456bb6f99d2cd155bf206ddef19b671418bf3c57ed02f60da670365e8b753f146a5e4b905d115", "e4199bbc60adef4c450418f7c56fad16ff1b8db4314ac4ea9c30ddcc2c4c8bbb", [0xa9, 0x6]}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$LOOP_CLR_FD(r1, 0x4c01) write$P9_RWRITE(r1, &(0x7f0000000800)={0xb, 0x77, 0x1, 0x5}, 0xb) r6 = syz_open_dev$adsp(&(0x7f0000000840)='/dev/adsp#\x00', 0x4, 0x513000) write$P9_RLOCK(r1, &(0x7f0000000880)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000008c0)) write$P9_RATTACH(r1, &(0x7f0000000900)={0x14, 0x69, 0x1, {0x10, 0x2, 0x4}}, 0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000940)={0x0, 0x11, "3ede70e8a90f54b1a3db3309c03768559f"}, &(0x7f0000000980)=0x19) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000009c0)={0x86, 0x2, 0x800, 0xffffffff, r7}, 0x10) get_thread_area(&(0x7f0000000a00)={0x9, 0x20001000, 0x0, 0x7, 0x43f28e77, 0x6, 0xffffffffffffffc1, 0xfffffffffffffffd, 0x6a0d, 0x2}) 14:01:41 executing program 3: getpid() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000400)='bbr\x00', 0xb4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x27, "49ce53cc81e285092d76489bc8c1a0be3adaae934400a12f81a71b89650e718c2a5b61823f8bbc"}, &(0x7f0000000100)=0x2f) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @broadcast}}, [0x8, 0xa3, 0xfffffffffffffff8, 0x2, 0x0, 0x7, 0x100000000, 0x5, 0x6, 0x10001, 0x3, 0x7, 0xffffffff, 0x769, 0x6]}, &(0x7f0000000140)=0x100) r2 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000000)={0x25, 0x3, 0x0, {0x0, 0x4, 0x0, 'bbr\x00'}}, 0x25) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x10000000064, &(0x7f0000000440), 0x0, 0xf401, [0x9c00, 0x2ca13d, 0xa000000]}}, 0xfef5) 14:01:41 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6(0xa, 0x801, 0x9) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x450100) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:41 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa, 0x11}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x100) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000080)=0x7) r2 = open(&(0x7f000080dff6)='./control\x00', 0x0, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa, 0x70}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00001df000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r2, r0) r4 = dup2(r3, r0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x5a8, 0x2, [0x1, 0x6]}, 0xfffffffffffffffd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000100)={r5, 0x1000}, &(0x7f0000000140)=0x8) 14:01:41 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x8000, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000000), 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd70000008000600e10b000000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:41 executing program 4: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2, 0x0, 0x0, r2}) 14:01:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") open(&(0x7f00009e1000)='./file0\x00', 0x8044, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x408) 14:01:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4, &(0x7f0000000080)=[&(0x7f0000000000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) 14:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 14:01:41 executing program 4: r0 = socket(0x8000000000010, 0x2, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef00000000000000014da1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x3e8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 14:01:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x4, &(0x7f0000000080)=[&(0x7f0000000000/0x3000)=nil], &(0x7f0000000bc0)=[0x1], 0x0, 0x0) [ 435.762665] device bridge_slave_1 left promiscuous mode [ 435.769505] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.822142] device bridge_slave_0 left promiscuous mode [ 435.828833] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.042618] device hsr_slave_1 left promiscuous mode [ 436.104508] device hsr_slave_0 left promiscuous mode [ 436.143737] team0 (unregistering): Port device team_slave_1 removed [ 436.155831] team0 (unregistering): Port device team_slave_0 removed [ 436.165512] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 436.206277] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 436.286631] bond0 (unregistering): Released all slaves [ 438.741186] IPVS: ftp: loaded support on port[0] = 21 [ 439.047208] chnl_net:caif_netlink_parms(): no params data found [ 439.081005] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.087520] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.094455] device bridge_slave_0 entered promiscuous mode [ 439.100921] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.107617] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.114598] device bridge_slave_1 entered promiscuous mode [ 439.132091] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 439.140709] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 439.159631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 439.166889] team0: Port device team_slave_0 added [ 439.173018] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 439.180072] team0: Port device team_slave_1 added [ 439.185476] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 439.192707] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 439.273211] device hsr_slave_0 entered promiscuous mode [ 439.341433] device hsr_slave_1 entered promiscuous mode [ 439.391519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 439.398367] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 439.412416] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.418758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.425673] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.432087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.460165] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 439.466376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.475134] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 439.483614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.490703] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.498022] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.507179] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 439.513398] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.521790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 439.529534] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.535910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.551532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.559083] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.565485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.573662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 439.581564] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 439.590904] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 439.603224] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 439.613155] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 439.623801] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 439.630153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.637743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.645258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 439.657667] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 439.667451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 440.031535] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 14:01:47 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 14:01:47 executing program 4: r0 = socket(0x8000000000010, 0x2, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef00000000000000014da1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x61c}, {&(0x7f00000024c0)=""/4096, 0x10fc}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x3e8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 14:01:47 executing program 3: io_setup(0x6e, &(0x7f0000000040)) io_setup(0x2ff, &(0x7f0000000000)) pause() syz_execute_func(&(0x7f00000009c0)="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") 14:01:47 executing program 0: pause() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dcc0510d46f") syz_execute_func(0x0) syz_execute_func(&(0x7f0000000500)="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") 14:01:47 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:47 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000300)={0x7f96, {{0xa, 0x4e20, 0x1, @remote, 0x6}}, {{0xa, 0x4e22, 0x9e, @loopback, 0x100000001}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x301401, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000), 0x0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:47 executing program 2: syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 14:01:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000000)=0xed) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @sack_perm, @mss, @timestamp], 0x200000000000003b) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x9, 0xffffffff}, 0x14) shutdown(r0, 0x1) 14:01:47 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="430221fa42bd4e206c82a813ef80d7ee"}, 0x1c) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:01:47 executing program 0: syslog(0x3, &(0x7f0000000200)=""/140, 0x8c) 14:01:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x67, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r1, 0x5, 0x0, 0x0, {{}, 0xfffffffffffff000, 0x3, 0x0, {0x14}}}, 0x30}}, 0x0) 14:01:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'e \x00\b\x00', 0x2}, 0xfffffffffffffee9) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x0, 0x0, 0x6a000000000000, 0x6, 0x1, 0x5, 0x2, 0x200, 0x2, 0x1938}, 0xb) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000140)={0x81, 0x0, [], {0x0, @reserved}}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc044565d, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket$inet_tcp(0x2, 0x1, 0x0) dup(r1) 14:01:47 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3d3427e) unlink(&(0x7f0000000100)='./file0\x00') clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x8) 14:01:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x13e) read(r1, &(0x7f00000000c0)=""/11, 0x434) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffc}) 14:01:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, 0x0, 0x890) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) 14:01:48 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000040)={0x9, 0x3, 0xfffffffffffffffa}) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="100329bd7000ffdbdf2504ff0100008fbdcdb4000000280001000800090027000000080004004e2100001400000016c577ecdb0000af30ef1fc05faf633b"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x890) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) 14:01:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@in={0x2, 0x4e20}, 0x80) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 14:01:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000002c0)=0x10) 14:01:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@bridge_getneigh={0x20, 0x1e, 0x411, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x20}}, 0x20}}, 0x0) 14:01:48 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="63a400007180c2458990e7279de835e2ed59d7d77d5af542c9945af67327601bf8f42c8ab672353a59c8b5c03700603ba25e0a837dbf8f2da53c19bf2401e75a50d791849f2217c3e2050be53ba0282602373249d94a4de8630e41d3473c579f347bbd00ff23377b654c3e2436dbe496dfda99bb0c932d3ed8d2ab32d1bc393015de1c77b33f74ebf4d8076a8ae196f325a6a81d2d6422c42ee013c79fe073bf3e8f38dc5ecf785f651c33424fd4f50583df4b305e166c2ff00b5b7dadfc52a79b4fc9b4a591b1b2c97d0988acaa637eb1b743", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x2) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc209, 0x0, 0x0, 0x0, 0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:48 executing program 4: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x48, &(0x7f000000dff8)=[@release={0x400c630f}], 0x0, 0x0, 0x0}) 14:01:48 executing program 0: syz_execute_func(&(0x7f0000000080)="b1c191cd806969ef69dc00d9d0d0c44139fd5bf91cc1c7c6e4c653fb0fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746f3400faee4749826261f696926400f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a125411d21d54111d00") 14:01:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x753, 0x22, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) 14:01:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, "7521623643269db3c76640c9d88122cfcb256f5d61d862e4eb17fd5418e1d387e60130ae9c0625fa8ae96c1136310f31c4c9cab63bea9564b2f65d1f1498538b", "eb63caccef17d7f2c2cdb9a21a4a359d69ddab8f74747f850f16ae405898769e45a79c2566ca2e8a0a63a5206695e144565633b7e4377c37af79a513baf170b2", "7ad135398af23908db79fe70be1fb5e0767ce94719083d53a6ef5e7357acd351"}) 14:01:48 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) 14:01:48 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x100000001, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0xfffffffffffffcb3) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x10, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 14:01:48 executing program 0: 14:01:48 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1e) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) 14:01:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x3}) [ 442.087238] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 442.116157] overlayfs: filesystem on './file0' not supported as upperdir 14:01:49 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000000)={{0x3, 0x0, 0x7, 0x3}, 0x5, 0x7, 0x8ea}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x10000, 0x0) write$vhci(r4, &(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0xc1}, 0x2) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r7, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) getsockopt$netlink(r6, 0x10e, 0x7, &(0x7f0000000380)=""/93, &(0x7f0000000140)=0x5d) 14:01:49 executing program 0: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 14:01:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:01:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000001180)='threaded\x00', 0xfc9a) lseek(r1, 0x0, 0x4) 14:01:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ba8b000280000085000000ffffffe495"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x28) 14:01:49 executing program 3: 14:01:49 executing program 4: 14:01:49 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:49 executing program 3: 14:01:49 executing program 4: 14:01:49 executing program 2: 14:01:49 executing program 0: 14:01:50 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000011e5d424c1", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d00000008000600e10b00004146c8e45b1eb18c8cbf00c976641cb63cd120e4becbce08793b62bf014dc231a9068bfc86004f492a4eaa52a10fe8e6e67cfe23e8b05b7027e1c67e921b19ef20a6b3e38ab74193d14387b3412b718ca5a0c6b49db426b88c125d7fb8338176a2a4b4473e9e97d7de2458e5e2bf018fd32a6827622fe09c9ac69a1cfbb6b1a255fe9d7cb6737d54016f571ecd2bbb94be224c74db314bd95975ae7ef5ed8f8effc7a8f763ee6f53e5d40b95165d1f2029a664eb26d8fdebaaf267301a77d1e68a3f00000000000000d0b44436fb53030ab62e90e3bf827a49e0b1544cfdfc4d08"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:50 executing program 3: 14:01:50 executing program 2: 14:01:50 executing program 4: 14:01:50 executing program 0: 14:01:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x7) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:50 executing program 0: 14:01:50 executing program 3: 14:01:50 executing program 2: 14:01:50 executing program 4: 14:01:50 executing program 3: 14:01:50 executing program 0: 14:01:50 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x401) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000500)={0x0, 0xfffffffffffffffd, 0x60, 0xde, @buffer={0x0, 0x95, &(0x7f0000000380)=""/149}, &(0x7f0000000000)="d3e5e4a5d392823a52c9855f86c44dbe3717126c1e9e1c77811589fe065f30bf6a9916ac710b7515a6b20470cb65a1f5ad82ee2cb3b665a01ad719217b81b47d0de2db9b1f1ece8494619bae7a729d4cc28a2e12b87249818974da6ad7420d1c", &(0x7f0000000440)=""/143, 0x0, 0x20, 0xffffffffffffffff, &(0x7f00000000c0)}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:50 executing program 4: 14:01:50 executing program 3: 14:01:50 executing program 2: 14:01:50 executing program 0: 14:01:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = syz_open_pts(0xffffffffffffff9c, 0x80) r6 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$FICLONE(r4, 0x40049409, r0) ioctl$VT_SETMODE(r5, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:50 executing program 2: 14:01:50 executing program 3: 14:01:50 executing program 0: 14:01:51 executing program 4: 14:01:51 executing program 2: 14:01:51 executing program 3: 14:01:51 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="1d7c0331f92db2f66c0000000000"], 0xe, 0x1) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:51 executing program 4: 14:01:51 executing program 0: 14:01:51 executing program 3: 14:01:51 executing program 2: 14:01:51 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000005c0)={'dummy0\x00', 0x4}) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000580)={0x9, 0x7, 0x8b}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x408, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x8014) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r6 = syz_open_pts(0xffffffffffffff9c, 0x80) r7 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x420400, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r6, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r6, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000007c0)={r9, r10, r11}, 0xc) close(r3) close(r5) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') getpeername$tipc(r0, &(0x7f0000000880)=@id, &(0x7f0000000840)=0xffffffc8) sendmsg$TIPC_CMD_GET_NETID(r8, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x1c, r12, 0xf38, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8080) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r7, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:51 executing program 0: 14:01:51 executing program 3: 14:01:51 executing program 2: 14:01:51 executing program 4: 14:01:51 executing program 0: 14:01:51 executing program 3: 14:01:52 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) ioctl$VT_ACTIVATE(r3, 0x5606, 0xa7) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_proto_private(r2, 0x89e4, &(0x7f0000000380)="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") close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 14:01:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:01:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:01:52 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x1ea5, 0x9}) 14:01:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r4, 0x7}, &(0x7f00000001c0)=0x8) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = syz_open_pts(0xffffffffffffff9c, 0x80) r6 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r5, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:52 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x20800, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x10, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) [ 446.204799] gfs2: not a GFS2 filesystem 14:01:52 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) epoll_create1(0x80000) r2 = syz_open_pts(0xffffffffffffff9c, 0x80) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000000040)={0x87, 0x80000001, 0xa7, 0x5, 0x10, 0x200}) ioctl$VT_SETMODE(r2, 0x5602, 0x0) close(r1) close(r1) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYBLOB="3f0000000100d936c6861b317934c1b6c9e60463cd6a3049da6c72ed97a5fbc3f2c59cfad7bbe763b251f23a7855d879d9d13cdb83b39628c6c35c70bcf28b6deaef1c9b65416a7256e49e840984483db8751caa7196721638ef7ebda4825d352e341bfa2444ba9b4816d9c3d2951c20768ad62325c5e8e808e0fdea92e825899a8687022301c49f1ee684bac550c010276656c66b632695a506f1cb33ebaa1856dd1f14670b1a37e7efd7c7ba8565c262ba8c5a9288a321f0588ec0a71a2228ac21b1382694a7a5c5c482fad4f743cd8c53ebeb1c55230d8cdc3e73f16a4d565b056ae44f8c89a7d7dbe9e9ebb64a06ce1c56834e6ceb"]) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 446.261163] protocol 88fb is buggy, dev hsr_slave_0 [ 446.266351] protocol 88fb is buggy, dev hsr_slave_1 14:01:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="280000000400000000000000000000000100000000000000000000000000000000000000000000004f46212335155625f5783c03818b85e31eb2b27e439cd151e5bb95dc1ab4f254a0ce07bbb73b6c8fb1e89f9b0c51688542f942b3c57eb013285bd4253891b459ca17dc7724af6bd19349c6dfaf2a562ff7e10cc14130c3437323b92b"], 0x28) [ 446.341192] protocol 88fb is buggy, dev hsr_slave_0 [ 446.346337] protocol 88fb is buggy, dev hsr_slave_1 14:01:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x0, 0x0, 0xb00000000000000], [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 14:01:52 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000380)="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", 0x1000}], 0x1, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f00000013c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x44080040}, 0xc, &(0x7f0000001380)={&(0x7f0000000300)={0x1c, r5, 0x0, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x10) r6 = syz_open_pts(0xffffffffffffff9c, 0x80) r7 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) connect$inet6(r0, &(0x7f0000001400)={0xa, 0x4e24, 0x0, @mcast2, 0x1000}, 0x1c) ioctl$VT_SETMODE(r6, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r7, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) syz_emit_ethernet(0x140, &(0x7f0000000040)={@local, @empty=[0x7, 0x4, 0x1000000, 0x0, 0x0, 0xb00000000000000], [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x60, 0x0, 0x0, 0x3, 0x0, 0x0, "e57044", 0x0, "cd98e8"}}}}}}, 0x0) 14:01:53 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) readahead(r0, 0x1ff, 0x7fff) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:53 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80004, 0x3c) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0x15}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002e00)="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", 0x2b7}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000a00)="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", 0x245}], 0x1}, 0x0) 14:01:53 executing program 3: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="02070000100000000000000000000000080012000000010000000000000000e305000000000000000000000000000200e00040e0ff00000000000000000000000000ada800800400000020000000000003000600ff00000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 14:01:53 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:53 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x800, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000003c0)={@in6={0xa, 0x4e22, 0xfffffffffffffc00, @loopback, 0x6}, {&(0x7f0000000040)=""/246, 0xf6}, &(0x7f0000000140), 0x35}, 0xa0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) getsockname(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000200)=0x80) 14:01:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000100)="1cfdb5b598cd800f1211f57962f5696200d9d9d0170f1205d1260000f9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4e801e80182663ed107c2c0bb7063f2168f4808eebce00000802000c422b18cc4e3c15c80c02400000e0000005151c4a27d181ec1ea01eff265dc5f00c35b0ad1304545e269a841000fc4c2559c3766030fae6a69c6c1197d780a780af145f15463805bdedec4f3f0016f41400f0d1865f20f0f0b96fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") syz_execute_func(&(0x7f0000000140)="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") r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{}, 0x2}}, 0x10) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) write$cgroup_int(r0, &(0x7f0000000000)=0xfffffffffffff800, 0x12) 14:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1e) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052ace3c7f000000000000000000ff3bc477800225cdb8b960b17495908c89f9928c845ecff6a238380c500b5fc900e611000000004812f9fa"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) socketpair(0xf, 0x80803, 0x2, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) 14:01:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x100000, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000200)=0x8) bind$pptp(r1, &(0x7f00000001c0)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) r2 = socket(0x100000400000010, 0x2, 0x2) write(r2, &(0x7f0000000000)="2400000052001f0014f9f407010904000200071008000100010000000800000000000000", 0x24) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0xfffffffffffffffa, {{0x2, 0x4e24, @broadcast}}}, 0x88) 14:01:53 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='syscall\x00') r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x3a9000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x81) gettid() ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) timer_create(0x0, &(0x7f0000044000), 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1004000000016) close(r1) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000240)={"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"}) 14:01:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x0}) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000500)={0x2, 0x0, 0x4, 0x0, {r8, r9/1000+10000}, {0x3, 0x1, 0x2, 0x2, 0x200, 0xfffffffffffffff9, "6c65f3d3"}, 0x4, 0x1, @userptr=0x80, 0x4}) [ 447.365136] audit: type=1400 audit(1556719313.881:103): avc: denied { relabelto } for pid=15799 comm="syz-executor.0" name="UDP-Lite" dev="sockfs" ino=51897 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=rawip_socket permissive=1 [ 447.444812] audit: type=1400 audit(1556719313.931:104): avc: denied { map } for pid=15800 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 447.480674] audit: type=1400 audit(1556719313.991:105): avc: denied { create } for pid=15797 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 447.577811] audit: type=1400 audit(1556719314.021:106): avc: denied { write } for pid=15797 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 447.706409] audit: type=1400 audit(1556719314.171:107): avc: denied { map } for pid=15808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 447.905707] audit: type=1400 audit(1556719314.171:108): avc: denied { map } for pid=15808 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:01:54 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000380)={0x0, 0x0, 0x3, 0x0, [], [{0xffffffff, 0x8001, 0x6, 0x100000000, 0x1, 0xfff}, {0x1, 0x4, 0x2, 0x1, 0x81, 0x13}], [[], [], []]}) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1, &(0x7f00000000c0)=""/57, 0x39}, 0x42) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:54 executing program 4: clone(0x480002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000000000), 0x60000002, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x20000) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000080)) r1 = gettid() openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) tgkill(r1, r1, 0x13) [ 447.965673] audit: type=1400 audit(1556719314.181:109): avc: denied { map } for pid=15808 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:01:54 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:54 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2f0000001800030007fffd946fa283d48020000000040005031d8568130009000800000016ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x28000, 0x0) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000080)=0x800) 14:01:54 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000040)=0x1) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r2, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x14000000000, 0x8000, 0x9, 0x1, 0x0, 0x1c7, 0x10010, 0x2, 0xaa, 0xff, 0x3f, 0x1, 0x7, 0xfffffffffffffffb, 0x3, 0x3ff, 0x800, 0x6555, 0x708b, 0x7, 0x2, 0x80000000, 0x3cb, 0x4, 0x3, 0x8, 0x10000, 0x2, 0x7ff, 0x20, 0xaf47, 0x3, 0xc00, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x2e8fe2a4, 0x7, @perf_bp={&(0x7f0000000180), 0xc}, 0x8000, 0xffffffffffffff01, 0x7fff, 0x6, 0x0, 0x100000001, 0x1ff}, 0xffffffffffffffff, 0xb, r1, 0x1) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r6 = syz_open_pts(0xffffffffffffff9c, 0x80) r7 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r6, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) close(r4) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r7, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:54 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@initdev, @in6=@remote}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, 0x0, &(0x7f0000000140)) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r4, r4, &(0x7f0000d83ff8), 0x2008000fffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ptrace$peek(0x1, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000440)={0x254, r5, 0xd00, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffe01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_BEARER={0x134, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0x94}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ipddp0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xaef, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8000, @mcast2, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xba9}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x254}, 0x1, 0x0, 0x0, 0x8000}, 0x20008854) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000740)) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020429f1c31600000040000000000000a8a8db994f3b222f494a1b953b6774997f96c6285b9e7b2cfb42e870"], 0x2c}}, 0x0) mkdir(0x0, 0x0) [ 448.110929] audit: type=1400 audit(1556719314.181:110): avc: denied { map } for pid=15808 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:01:54 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket(0x10, 0x2, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write(r0, &(0x7f0000a6b000)="1f0000001000ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) 14:01:54 executing program 4: mkdir(0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x181000, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'bcsf0\x00', 0x6}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\r\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\n\x00\n\x06!!\x02\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 448.391253] audit: type=1400 audit(1556719314.211:112): avc: denied { map } for pid=15808 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 448.537864] audit: type=1400 audit(1556719314.201:111): avc: denied { relabelto } for pid=15799 comm="syz-executor.0" name="UDP-Lite" dev="sockfs" ino=51909 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:checkpolicy_exec_t:s0 tclass=rawip_socket permissive=1 [ 448.626643] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 14:01:55 executing program 0: syz_execute_func(&(0x7f0000000200)="b1e491cd80696852ef695c00d946f91cc10f788e008000000fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01efc48192558dc3c366450f186746660f3a208f09000000767c7cca4f7307da7307da0f0d18c401fe5ff6e3df646736676666430fefb3000000000804f4f30f1a1254111d54111d00") r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x541080, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000000c0)={0x1, [0x7]}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x242) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0xc8, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5b}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7e}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x24bbc0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4004004}, 0xc0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0x58, 0x10000, 0x70db, 0x5}, 0x10) [ 448.813583] bond0: Releasing backup interface bond_slave_1 14:01:55 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 448.900148] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 449.013808] bond0: Releasing backup interface bond_slave_1 [ 449.090143] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:01:55 executing program 4: mkdir(0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x181000, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'bcsf0\x00', 0x6}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\r\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\n\x00\n\x06!!\x02\x01\x00', @ifru_names='bond_slave_1\x00'}) 14:01:55 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x80) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x80, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:56 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000440)) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = msgget$private(0x0, 0x4) msgsnd(r4, &(0x7f0000000000)={0x1, "ccbc34b5c349e562eaa38e67f44e027fb3be7da1c00c76e5a0c47a67d17e8ad44912f95962bc925c7413aaf57d1e8d8e62667e297d3f922113c6281f80e4c97be3dc4711a5fbca6cc0b92c6c832884f02f0bff8483c44b551b2183f6686fc72b131f7b3f1b99484731e704241c32b9b39151f3ecaee8"}, 0x7e, 0x800) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$PPPIOCGFLAGS(r5, 0x8004745a, &(0x7f00000004c0)) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r6, 0x310, 0x70bd2b, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x80) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0xffffffff80000000, 0x202800) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="9131b240859bbf36a7b0833ac0c0305bf7f98ecd426a8e716f7e1930b7676d8b986eceb1181e510d315072a7a55c5dcd5227a6adea392f95f72ba36d4b40d4dc7d761fd1526ec8f029eb057b467259b321d35a0fe5ebdc194d188a70752f7ca63a9d533dd7b0d14e417ff543288f41869fcd8c2e4b17a58e0130f5b017087c0892a41d9acabf31de2c2e2a57f3f6fd", @ANYRES16=r7, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00#\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @broadcast}, 0x0, {0x2, 0x0, @local}, 'syzv\xfb\xbdH\x10lMK\x00'}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x3) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000100)={0x0, 0x1, 0x7181, 0x7f, &(0x7f0000000040)=[{}]}) [ 449.622193] bond0: Error: Device is in use and cannot be enslaved 14:01:56 executing program 4: mkdir(0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x181000, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000040)={'bcsf0\x00', 0x6}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\r\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\n\x00\n\x06!!\x02\x01\x00', @ifru_names='bond_slave_1\x00'}) 14:01:56 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x0, 0xffff, 0xfffffffffffffffb}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x3}) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000000c0)) 14:01:56 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 450.189490] bond0: Releasing backup interface bond_slave_1 [ 450.298062] bond0: Enslaving bond_slave_1 as an active interface with an up link 14:01:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:01:57 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000300)={0x3, 0x0, 0x2080, {0x5000, 0x1000, 0x3}, [], "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", "257be9368c4f39e5f872f0db1f0239ef2e2367781a1f6f53d911eb90efa9c5e7fe8ba136b47a608c49e3e1fc5f6ebde9ce1586a67bda26e38893169b4701b17e7a0a639e0751bc4a09c6b2f4fb90c684a20a6c69ba5b357fb3d0b043a64bdcc55bb4f33307a23968d3e1849f9ecd3ed657ffbbcce9ab8b140fcaeb687b1a4c186fefac4edcce5eb10a9c21d49c2cd2ba1aa4dc547d7b8f8b73149b5b95b21a6ebb1806df6c3401ec2b8a41972753f0476c8fc508ccd829500ea5d0cbc6ddb66c4ddc39e10f2c807b74698acb1b23ebd6b6537578e1a5f35bdf3668d65ba832ea367409ef290b30aa3e6f3fba6c21f3a00e3ff960ad3ffacef3f50f516767c5c90fd92a4aa78f67c57c7098e4063f83ed941c568248b2cb7d8c49a254ba8a3bba9ef14d2268986d341a634085d8e2cd3589fd663a1a643b3d8380f0525f96a4616b0fe3785b8006d3b0f8539c2156d342646ec92e17c9c5d3ae56fae6e17c2b0e53a9218cc92ec440f208d589a21e6c49ace7423def8e47bdbe2db32896299bc78f33192dbd02fb606f909fdf048da989df29a73235cda3ad562a283bb188b8ded136625102b9018a2b17209f0c5a24ed78486691107f608bf214659c9309cbdecca64410e707a2438f4e02c44469f387c09acb8e7f3a73fa56193b2eb7bc359207a8c358efdc6182259ba5a73eaa0d4f594d1047c03a72082f5d8eb28554dfd0ee9d6122e43ddc41d32575790ec82d0a8f1f365225536ad3c81c5269b50b9fc85b21a220627b61ca3f26cd91c34a52a9670a89d37844d3f5874dd7134bf2261cab686b93f09c15eb2f91c9453621f0f377fc736f451d0ddcb07c365b0c99a7f8be4da5567d51aebe459e3219e81a6b5931bb213bac39829e52de98c53367066ad54e1ef6b8501a91a0a029129654136adc15da9507e4e683f3852ce6e0b60c249342c8af83f218ad73091f23cb780c5ae83e9f1cac3738b55bdb5bc7eae81f80a16b7c6d3349e7336c77b40469d2e022de88732dbc731cb10d7bb77dde918263766ce9a75dddeb7e9678eed85a89775037e4fd41d37f67d597c0f73a595919c9675f2d7d7bc2279e9271f5b606759c4c60b3a52efb0d8debe6a3f03c57c4347ae6c901457fa5cfdf3c53e86d8ca0e2551bd09a83c555d74101a7fd2839f635881d71fab3dea8ee1264c60744353e93355ba5c818d2eb6b09e13fe230acfcebffcca1461bfeade2894c49603c9b8f873b1414d0ee0848ce3b07e8f3eca323d50a4b7fdd89d31a6d9c01936370a7009c90683b89385bf48d9e1191f289a93bb57e79c08d35160db7967c46214d3db3f970935d70e07848c6c7036eef00a0f786600309cb694a71782bbd3065fde65732cc67e3a96bfc7b06a560209f4b2e05996f55f7b53130b7d48b41ac5abc0b881a618d1d9f1f75008b42a9bfb4a060126749869936fffad50992edb75f03947e469112cef03dfcdc4d19b3f80d88bfd15469f3a4c48d359d511d3ae86835a54a4bf415b1578080f39f25f877819f2ac233e9fddf28896027d7fcdda64f3cd347468ed62eb8baed51b01d6ff3788c99140f81d2bdc7ad56af2c3f2f57b8f1f9da067a1f03f46b6e6980aaa69eb216483a58e25db63433696a120e62d479b736f6cd3d15d45355cea70ff5e9d9a6af63cd1d48f8d4cf7ad570dfbd2fdad629aa9a2f2c7bed2fd35224e96813b3a22ee7e4acb7be38b3ee3127060c663687d81a0b50b71c244578a3cc0fcb0956f59864ecc2071b86d962bc170ca7468a32369f416f75852f8dbc16163bc7106e933b7217adaea455cd22128daeff4bc8e27f186d6d4f8725b5e237338a646e487f4aecb4fee7fd8f3c2386e30fba9167fc765aa0f332f266d28000524e5e98f16647c628aec261fe59b45e6c71369ee750dc28a1136bcefb20fc08c7fd6ebcd4e0a995ec10aeed03ab347c14ef438f65a97e0235616f3577ebc3bbe49a13e220930fb52e54ed44204874113d48bdfe8e0b3fb72a8f73b3f73afa8840ab14b560fdb3ae6b7eebae0f8831febcb974bbf01ddceef70278edc1eda265417ac1fc120b83259599fccec2082e8034ae35b174f03dbe6e20c0cb8f27bc3700620df559222bfcf0169b37f9ae18921069115e6dc79c99017d2a42a5bf345649b51e393913dc7254c0e9361265a3caceadb80e32bcd0ef6b88400b1435456bd955b26d3bc882769ece7059538f0054b05e4795d34566a11e8166caa7fb399f8d8970da31b22a7cf30f4929a7980237d4dd900bf3ad72cfe08a3be0011dceb5e9ae1af55287b1ef8feb990504fb1bd1125aea261cd87527db7e237cde41a810c92ea33c9ced6950569f5414f90421600c01d5fc4b55385a01226a9e9ba1c967b0634134802e3602eb148d52db819a21603d88ba059cd1faf4fa551a67c97583aeda2968347db6f1fd78d536b56e43519180a918b503055d2c10b9ffc22e779701df54d4648b387816517e77ffc290264a0ec5e26e105921ca2d2b708a4f7cc0a20652ea051d2b6ab64975ff111f94a53606e5f90f62bd76a1813bd665e6b7c7b336c06bb060a3b59b234779bf03676d72e5bbe8f414e38ec756ea959fcb32cd647b689e8b6ba95263259ceda409b750ab35cffa0c67526ceb699478b764ae18739ceefe9f2e208a7d8e2e90ad232f5b63e8fae3d8d29f1e5cdf73bfbbe7324e5b77c932a666c42926c37bb2b902c88c1f84c00a39134809438891bbe6790573ae6b9ac662921b6108c48468f850ff35d9e70228855c56d81656e28873d88a621fcef95d9aae32bd0ba2e859c69b468a73f2698e12b380eb526dae4c21782927eca463c9abc4b933b21954da48363fb5dfbedde3dfa4426308890476b2fa4bd1d15ec425e022bec4a0b5dc3bf8bc4d387917c14307e10b226d2f3736ecb384d61ff803f7049388530f9d4ffddf9367eb76e9e7355bee1e12d55cefd6a07b3a67cf7fdb140a1f10d3a5638de444b75d433675d9d6652705abd08e6841acd9600006c96e080de9d9a72cd59fa7dd5a2f7cc62bab21bb6f1d8c13bd9a42c6f38f08b0155535ab5b493eedcd39c64fbb3be2ada30c9c770c07e2aa8d8e22adf2a15515905ef1bd648f3c198cb23853e8b1da513f778d74d562fceb44a48586c605e8e3f4dd55af364be6c3b05be7848ea99cbd09f516350fd60e3c2e1fc69a6eab10b9162f067c7b03d68ba781a75143d93528c1a1ae1fe41fbb561cb8f07b119ef01920f35d1116a62e7795dce0f74d1cab0e5a18c9c2b11cb3bef5d043056e3ffc13a27ff6c1bdd2099a4265eda52f051656c910b8fb0af0b563c99c122c562a68cacabd4cc09466356354d4ee9931a18475946249256340db01d1d41834c0770049885fdef39092bbf4458d7a61417f9707ebc37e6bcb5f7b2968ab058e9522e3b387975b825e24b9af5a3659462e6001ee6cfe494a8eea1094d763d89181889f5e15419708215f6b08477a332c64424d8be58a6b590fd07aa5ae05699d02012477403e16bc945fdf8a19d551a9b52269d1ddd7b5274f55a8c5366f16ceb6dd0514863c9b7cf939fdd2b7e1d8c862facb947a216819c485475f1c62682156b788a0c38803413a45287fda85b0407b4677d71c4978ba67eebc845a1e50b981af3b7a08b7b378f56f2856a64e96de4bf9b3ef7c3091a941a92477498f8766ce57f1bbba93bb7db53da2ceb8a3e4496b0c0a27a8ae9df003f76ebe68ca86e9e40273e339ba436ce428e191dd0cccd481f9f1170bcc67c0ffb200ea2c7c792de5179f8f0ae3c811f41e6f1878668b98f58098cc9bbcf34aa071fa169e30d7d580962f81c98008695b628f7322bca790efc4bf1537eca7bf0dcc2ff97189260d8c654917f9ee985433b7fc504555e3c4cc7ec8502261f985da20739c255c9b4539bed37f26138211718d4276fffdbfd20a998aa92123b3a784dce38a60da8eca6ab8105cf26bdfcca8019ed31255b651d33108c71750fcd9a336306c24600b774664296bb471f8ae064eb16ce041a2de621e6d446f1eedc34e03ab57756de8048a5cb3c91e82ac0dad1834cbf8f0e0ca3f037fb35c68b29f9d7093bf87a81ff5e75b252b1a06bfb396316f049b49c2d3059011cefb037cf48897e7d66120113b147d0c9396018d2492084d434f1921a933fb6d689fc3dfd201a98138b48b92e1c35e4b638ae77c87b0d5d54eea8dca0876050bc4e313a66caa366360473af06708ef0d477516df3752c9c17487ebea688c246c35da785a63b3aee064fb4ae478e6af314fe77ee358a993d0cdd37fa2caa53aad3f7d705d11fb81221ad9d78e405baaf8a0eab82bd506efe52b049406f30db743f6e65dc5ef9c23a64cd97bf2b853f7a849052d0c913983c14941760ac199af3507426a994803ae13e8dcf71059bc6832f3800b9be7fc4bd663384e364bfe56f02deb879c7192f578512e61123781c7a4433b60aaece5c5f06e4438e89a3b5e33417493c027a253b6c923eb024383400a1986af7b7264b1ed8e25f7ff5c34c76d89c428abceceb78096d2d67ff00025b628fb5b40940fa47839db99d4fdeecd85f31128d7807f1f943e197176ae0beae8457f277f8a958bc7416c140f7261f9071913dcd6deea52b3eef10019d07f2bb37718a2894e8122c659ca87e2daf97f7ccc0bdac884c9a4aa6efdaa542360d5bb77c086d9b8748bf545d680677e051abf2f8c927839a235e856b52ba1935856ce3de47eb2f9a69973eba2bd40bf371b47caaaffb3e7b1ac1fe7a6ddbb437f6c2e5b1bc57b0ad6462512e59bca1af34611531634b31fc3e0d6363dc719a0030fb2e399ca53447231c98aa6e4b2e5688a8ebc9338394d23163214cf4faf2eff65c9e8b36d41c67554c0970ac5ca6561f0857a387372ca75100963fb0efb89b8e8918b0c713559e603837987b2a1bff380d81390aefbde05a26300e2fb8ebb5913f9a0f9d0dc6eb1ee233087db457c3e1cb8e449fc1b08227c6228617e5023f06e8d9e1aa10169e73796030713aa4ccbed94523af8748af8025a7be45c69a63845e206b48862795a9ff394fcc8b3ca296c999f8a66f383efd8eb3d80c7e86f6e136234466bc9cb0364aa70429f932db7c58ba9b53fe265a786fe6f368736266e696a2f488e585d7b8279f36648a8607e2dabaccb79d6778cf960feea74dc25c4ebe7fc0c420ab90ea90cdaca43ba2658460598405eb9f068197ea206999d05dd10d394eaa0c972d0e55f738ad91049de346d0c524cb54575893c9d8e1b1f86cd94e40685d45a6e164b7341b23259fadfa9157c12a8e3c84e5e54b2da9aea228698c314733a9ae0a3f511a738ca95ca1a8c556d33baf77ec168b7461c8a1fc9bc49363e93c46e80ba0f0a881f61db85eb5df751c6c66fcf2167ce68da8703aa71821590ae7b8c842e703c3614b95a5774be39f32f8b08e198efdd0c067276beb512b219c60af1880fb61958518f394969752c76101c4ab41eb6529c715b7012596a3ca44b3e8d63876ee0c9f618612fa6eb35750a1113220125f0779eba6c083539a46b33a5324a02813e377f51f2e13f841b738e857cadeff700c1066cd6137d2784ea17f258608adb05215f4658d42025db7e949d877b1ff0cc0651451d90b50d9088d1ce578c8c9a9b2239583513cddfe8fb3b39f31e4fec82b109cbd35c0a928cae4766ed55f917e9fb978c7f52ad1455564cac88bef6d509e0f6e8f99430e47508da75816dd282ffc20ce6ef81b942c46fb2068fe490c37306961bea946d7ce904c3fc1f56d3a4e0561b7b"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0xfffffffffffffffa, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 14:01:57 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000240)=[{0xffffff92, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"2da7da500adedc64d10950c4"}}], 0x30) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x5, 0x7, 0x9, 0x0, 0x1f}) 14:01:57 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x1b4) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000380)=""/134) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r5) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x80000000, 0x7, 0x294, 0x4, 0x5, 0xffffffffffff3a59}, 0x2}, 0xa) 14:01:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x1000000000001, 0x84) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000040)) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) 14:01:57 executing program 3: add_key(0x0, 0x0, &(0x7f00000001c0)="04", 0x1c7, 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x200, 0x2c, 0x1ff, 0x6}}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x482000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0102350d6becea002aa77000ffdbdf2501000000000000000c41000000140014623f00000063618e742d"], 0x30}, 0x1, 0x0, 0x0, 0x4c895}, 0x24004000) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000000)="b18791cd806969ef69dc00d9d0d0bbc44139fd5bf9f9c1c7c7e4c6b4fb26668a47466d586567f2f20fb065fef9f9411f2a168f4808ecbcfd0000802000c4e20945c3ea01eff33e36646442e9000000010f186746f3400faee47c7c730fc483096d4bff0e26400f0d1892c4e1fd107fd9d9df6766410fdb023665d95702f30f1a1254111d54111d00") getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)=""/214, &(0x7f00000000c0)=0xd6) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) 14:01:57 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) symlink(&(0x7f0000000140)='./file1/../file0\x00', &(0x7f00000001c0)='./file0/f.le.\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mkdir(&(0x7f00000000c0)='./file0/f.le./file0\x00', 0x0) utimes(&(0x7f0000000000)='./file0/f.le.\x00', 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0x7f, 0x7ff}) clock_gettime(0xb, &(0x7f0000000200)) 14:01:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f121c121f319bd070") unshare(0x2000400) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000040)={0xffff, 0x6, 0x2, "ecc3c3d127e894a125cd59d51fe28ffc138025534a42d0ba2bf66e3c808f3487", 0x38414762}) r2 = memfd_create(&(0x7f0000000000)='+\x8b\x8a\x16\x11O\xdda\xac\x00', 0x0) lseek(r2, 0x42, 0x1) 14:01:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x31, 0xffffffffffffffff, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) 14:01:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000100)={0x0, @local, 0x4e24, 0x2, 'nq\x00', 0x0, 0x1f, 0x24}, 0x2c) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x1518, 0x1e3, 0x1ff, 0x1, 0x2}) syz_init_net_socket$ax25(0x3, 0x7, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/163, 0xa3}, {0x0}], 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x8) getegid() mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getegid() r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac14140b}, @in={0x2, 0x0, @local={0xac, 0xc0}}]}, &(0x7f00000001c0)=0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x1ffffffffffa) getdents64(r3, &(0x7f0000002400)=""/4096, 0xc8b7) 14:01:58 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x10020006004, 0x1) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getdents(r0, &(0x7f00000001c0)=""/31, 0x1f) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="245cd7517a7e0657"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='udf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001cc0)={0xffffffffffffffff}) sendmsg$nl_generic(r0, &(0x7f0000001c40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001c00)={&(0x7f00000002c0)={0x1934, 0x41, 0x4, 0x70bd26, 0x25dfdbfd, {0x1f}, [@nested={0x2c4, 0x5a, [@typed={0xa4, 0x93, @binary="f893c0deff88e69aef87a77993c97f72dd04e2b2d15ccf2d725279144827b77309a8387880969c4ea7203237a1b9fbe69d49cd7ec524996df7558914bc6815d66cfe69f577ae68b2b35dd068b80548ae0b1af5fba6c3a636689291f125fa959ec520a04edd0bacb9d10856003b5486db895732bfd6438d4c65ef73419fa56c4afe9fa351896cab7f00eb4a80c5e61b7dc3d46f58c13a905cd3060bf00a"}, @generic="b9cc8a7f2a0efae789e2ada97eca6d42b47ecde44d857dc94d8c3f", @typed={0x8, 0x30, @str='udf\x00'}, @generic="61762c49fcb352c6ed2e09f6d22ef1fdce0438edb8d74e87e2c1a652f4110f873d008f0c4fbe0de5a97c0c462f56125f6ad8bce68a0627f75eb9ef8d526cc9fb3d115ccced373249906bcdbb9a5dc9c760213f7087d3fbf03072a5", @generic, @generic="ff6e9795b5404c813614a1242a4a77f2da670a97021f7cd088f2cee9c844898f1ba1372dd82ffa90521e812bad469f9584991fc95e95512fae45685b7fdbca7717095b7537c61eb2950f7ad5f62c9c12c4d65eac83ca1245ccf704956fa1513eaae162bb13065abc3da8ec939bd290b9f42fa1e1143876dc70390f92351d7538aedb472531c7a30452e90f99de06a3839390698d94580f41affe2c928a190668e62739aee9ad520ae8c45ee52fff8e5ad43103a3a8c6a8b71ce1b394839ab03255e58800cb82009d9b11e3e1d1929e9f17628b7f43b9b9880c9b297ecad64b597abb6c17", @typed={0x8, 0x4f, @u32=0x1}, @generic="0bdeeb91de157d69f9e9170dfd078c46b70895f8c67ed69ac84daedc6167ec184a0f798c8a0aef6736a68502b49f70dce59c89adf0b049b55eafb68335eb1a8376278e51301d09124835263dfd2ce848d17356116117c42aad4e1df12c51822daacfc7eb0d90107244d3bc44fc7817a86a675b134abd292fdd99a6c8bf9dcad1ea735826331f9bfc4d85ee8a5ce8a62ac24490d26cdfd3386b8608caa00041bad08cc3a5a0c61a4598d8abd994ccbd"]}, @nested={0x1f0, 0x94, [@typed={0xc, 0x3, @u64=0x4}, @typed={0x8, 0x63, @fd=r0}, @generic="a3ed24e06db73d46f05356e63ccc281b3bf2dbb81c804cc0e055ed866e3855f0e9affb9424d89807cb7d1598c66910a16a9a639ecbae464a4df0d376f90cf587b1436e67c8ed50fbb6dedacd99c93c4bbb8fe521064e3ee9b125fafef48c85d2ba6101c7a17e42e83ea597d34456783b431c13b1", @typed={0x98, 0x93, @binary="5b0ccb7ad3daa85766ad85ffe33902e5fb3adc95dc7f914e8b88c107c3792c06dc8d31ba5be937ad234f937a37243af04ee133866db86cb54800ec76facc7ac676a75fcce19be20a87aa26473b7bf1f2d63ac75faf03e39d1126163708d98321d32075bd46e2aa9d813841508726b6ae5e78054411711529d73ee3dae675f1e9999acee89d2168f4a946370a233502fab63607"}, @generic="181c92846b211af9eb8fb637b41af97e3caf11b54e75aefdc81d36828373c802fd0a00d1b6b52a68a3ae2d6f869a9af1f8a0df4aedf6b67c2d16eea81c35dd1f991ed2d8fb8161db6a35db202c8c2284c01db0c969f5deb3860027ae5185374d201b3aae003d7013736052a56986864acb9c124fd0d22f2bb89871708a3574bcf1b6546e3acbb6eccffbac7910765d2a2d6eb0f275da52d3f2", @typed={0x8, 0x45, @fd=r1}, @generic="e9e41d6fefeb341a70ec215accf793b1711417c22007b4926f18aed10353eefef20cfd20d4ca63a943e1d8"]}, @generic="6431e701199eef99f950e9bbef82c9f81ca23421aa18dee87509b5c559cd171cb936ca35230ff35191ed61cc67c6d4", @generic="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", @nested={0xd8, 0xc, [@typed={0x4, 0x2}, @generic="d8b6b5125d75a15354b5209a75ba1d4c2897617997d4a65586358ebf7e99da8ca7a2aa8beaa2dc317772eab5b6ba4ed6ccb8ca6710ea16a629d6ae785524238643045d141285a32622a382a1be31c827fa9caa10bc7235c41b40e99c30fcd6ea24c8c39080359d013309d2ccbb7422ac3dceca86ed2a6d5f65e141a0a8ce3dc7d5712060f5de5129a4b331348673cbb8f6393873a78b1f464a53ae747536811bda68192d86b7292e2b32cf601b3cab48c59ef0b787ac75a345cf6e92dc596707a57d6309d52dcaeb22e306b96b9d"]}, @typed={0x8, 0x2e, @fd=r0}, @nested={0xc4, 0x90, [@generic="3b793f776bc43238f6365e799a00284215a1df7e0c753d80a122b7d5a2a0972f1cc24bc5fe5dd89a2a088527cf2c8fe10e96836a2db67997cd20a4b265e2878cff4d721cc5368623ad073a3dfa4128a0639b8cdbd3320c0f876aade97fe53df2407003dca9c595228ed3ff504246eb8e599f333c1a55dd8b87b17aa18890ca60aabf28263e8c705b9f37a5ccefa3851c962269d083e3ad0679657d521b92564d3c960561c7d70851e63db3d80d446882ce0620e19854744406cd8f1e2e"]}, @nested={0x290, 0x1, [@typed={0x94, 0x2d, @binary="12749335de8c81fba761edad69e5b5800be9fa410981522104e97c479308fc55877f59f6e0d0dee6c8438cc89b93ff88b9cb4f84d599a5a3c15ff3d618aca2fc31a987dbd4425cda5ea3f68de9f31355c0a4838b69287c73f62fa613f9446cce2022a1ec06d4415c50c3a40bcd0bee0472b074defc7a2c64d1a8f64d8fce47c828010b3f3f75f2b7c356ed6494"}, @typed={0x14, 0x40, @ipv6=@loopback}, @generic="0df1d27cbfb7dc2bf0f6ddce28f8fcfdeccf408690cf75770141cec7c91ff143f77f667dad741b2fda39123173924d110638ff9b48f5ce63bc33b3531ed45cbe5e27adac8b9e8581a70a60391c12a17c9454a946043cd615033895b618cb39df1be214c030852b07c4a0fa98b71d9dd7d284698e467d65029a00a3a8e430b733560f22df71ca3be2b1508fe9da5a9ca888e74e7e2c338b2b6643aa9ebe7dc53b421f1fcf031efdf84ad026be", @typed={0x8, 0x58, @fd=r0}, @typed={0x40, 0x8, @str='/wlan0md5sum[!+*vmnet1[cgroup\'eth0nodev[-eth0,)ppp1security\x00'}, @typed={0x8, 0x6a, @str='-\x00'}, @generic="1eadfab8da0a936f3a6d3d0a664398a5f434aa51abf091699b2bb43497c93615760c739b32b1ac9313d2ce540455cd691d33395cc69c2e6103567120c01355a75aa28007a1fb1bc890c49ce1c85ec67dd91d46e22be39f4408534da0e1ca3f696de93b3d3933fa3b54ec72f483de671753bf3a3a7ef4", @generic="eab6791b221f65289c2d42dd6bafa9c8e6d2a07891f8f661d82d8ddc351b3f3463106eb3a21cf9637b98e21a5cd02c7740be92bbe3bdeb256910d1abcdf9f1ab71f3487c73706786ccf7e43f121924f9b6133ae57884583a8c35cb304a9d17a65439124947633c623885b293602c053f68"]}, @generic="8692503310495169"]}, 0x1934}, 0x1, 0x0, 0x0, 0x4008011}, 0x4000000) syz_execute_func(&(0x7f0000000240)="3e0f8a00000100c402a19ef3460f745932dbc046d9e10f937893660f17befaffffff3626663ea541d2827670759cc401905e17") r2 = socket$pptp(0x18, 0x1, 0x2) fcntl$getownex(r2, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f0000000100)={0x1}) fdatasync(r2) 14:01:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000000c0)={0x1, 0x0, {0xfffffffffffff113, 0x40000000, 0x0, 0x1}}) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffef2, 0x10, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8000, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x8040) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000280)={@ipv4={[], [], @initdev}, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001300)={{{@in6=@ipv4={[], [], @multicast2}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000001400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001440)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001480)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000001580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000015c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000001700)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001740)={@broadcast, @remote, 0x0}, &(0x7f0000001780)=0xc) accept4$packet(r0, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001a40)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001a80)={'ip6_vti0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000001ac0)={0x11, 0x0, 0x0}, &(0x7f0000001b00)=0x14) accept4$packet(r0, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001cc0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001dc0)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001ec0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001f80)={'veth1_to_team\x00', 0x0}) getpeername$packet(r0, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000024c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002540)={'veth1_to_team\x00', 0x0}) accept$packet(r0, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000025c0)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002640)={0x0, @broadcast, @initdev}, &(0x7f0000002680)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000002780)={@initdev, @multicast2, 0x0}, &(0x7f00000027c0)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002800)={0x0, @multicast2, @multicast2}, &(0x7f0000002840)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002880)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000002980)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000031c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000003180)={&(0x7f00000029c0)={0x784, r2, 0x213, 0x70bd27, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x1e4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x40000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x62}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xf3ac}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r8}, {0x140, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r12}, {0x1bc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8, 0x1, r16}, {0x1a0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xe1}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x4}}, {{0x8, 0x1, r21}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r22}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xbec5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}]}, 0x784}, 0x1, 0x0, 0x0, 0x4}, 0x40) ptrace(0x4207, r1) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r24 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r24, 0x5423, &(0x7f00000000c0)=0xe) ioctl$TCSETS(r24, 0x5412, &(0x7f0000000180)={0x3ff}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000001c0)=0x1) 14:01:58 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x8c, 0x2000000000001, 0x0, 0x0, 0x0) 14:01:58 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000000)) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="00030900a806"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000140)={0x6, 0x0, [{0xb, 0x4, 0x0, 0x8a3, 0x84a}, {0x80000001, 0x5c5, 0x9, 0x7c2b, 0x4}, {0xc000001f, 0x6, 0x8, 0x4, 0x64ef19c0}, {0xc0000000, 0x3, 0x0, 0x9, 0xc1}, {0xc0000019, 0x9, 0x7, 0xfffffffffffffffe, 0x5}, {0x8000000f, 0x81, 0x8001, 0x1, 0x1}]}) 14:01:58 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) r1 = dup(r0) accept$alg(r1, 0x0, 0x0) getpeername$netrom(r1, &(0x7f0000000080)={{0x3, @netrom}, [@remote, @default, @bcast, @netrom, @bcast, @bcast, @rose, @default]}, &(0x7f0000000000)=0x48) [ 452.372243] kauditd_printk_skb: 201 callbacks suppressed [ 452.372253] audit: type=1400 audit(1556719318.881:314): avc: denied { read } for pid=15905 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:01:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = syz_open_pts(0xffffffffffffff9c, 0x80) r6 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r5, 0x5602, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.redirect\x00', &(0x7f0000000540)='./file0\x00', 0x8, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x641f) r7 = semget(0x1, 0x7, 0x480) semop(r7, &(0x7f0000000480)=[{0x3, 0x6, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000300)=0x2) close(r3) write$vnet(r0, &(0x7f0000000180)={0x1, {&(0x7f0000000040)=""/25, 0x19, &(0x7f0000000380)=""/224, 0x2, 0x4}}, 0x68) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:01:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000100)={0x0, @local, 0x4e24, 0x2, 'nq\x00', 0x0, 0x1f, 0x24}, 0x2c) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000200)={0x1518, 0x1e3, 0x1ff, 0x1, 0x2}) syz_init_net_socket$ax25(0x3, 0x7, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/163, 0xa3}, {0x0}], 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x8) getegid() mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getegid() r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac14140b}, @in={0x2, 0x0, @local={0xac, 0xc0}}]}, &(0x7f00000001c0)=0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x1ffffffffffa) getdents64(r3, &(0x7f0000002400)=""/4096, 0xc8b7) [ 452.580650] audit: type=1400 audit(1556719319.011:315): avc: denied { map } for pid=15942 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:01:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="80000000000000009bd070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x2289, &(0x7f0000000100)) [ 452.716066] audit: type=1400 audit(1556719319.031:316): avc: denied { map } for pid=15942 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 452.820041] audit: type=1400 audit(1556719319.041:317): avc: denied { map } for pid=15942 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:01:59 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x400) utime(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2000, 0x0) set_thread_area(&(0x7f0000000040)={0x2, 0xffffffffffffffff, 0x0, 0x3, 0x9, 0x20, 0x80000001, 0x1, 0x4, 0x68}) 14:01:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x200000000000004, 0x3) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0xfffffffffffffffa}, 0x4) close(r0) [ 452.957071] audit: type=1400 audit(1556719319.051:318): avc: denied { map } for pid=15942 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 453.197264] audit: type=1400 audit(1556719319.071:319): avc: denied { create } for pid=15944 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r2 = accept(r0, &(0x7f0000000240)=@alg, &(0x7f0000000180)=0xffffffffffffff4c) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r3 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0xc00000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r3, 0x40405515, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x0, 'syz0\x00'}) ioctl$EVIOCGKEY(r1, 0x40284504, 0x0) 14:02:00 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x804e20, @multicast2}, 0x8) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0xfffffffffffffe99) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x4, 0x81, 0x7, 0x3, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x20, @dev={0xfe, 0x80, [], 0x1c}, 0x1}}, 0xffffffff, 0x8, 0x4, 0xfff, 0x9}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000200)=r3, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) shutdown(r2, 0x1) r4 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x14050000000000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") 14:02:00 executing program 4: semop(0x0, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1) unshare(0x40000) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x10) getresuid(&(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) [ 453.702824] audit: type=1400 audit(1556719319.071:320): avc: denied { write } for pid=15944 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:00 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x7ff, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:00 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x10001, 0x3, &(0x7f0000000240)=[{&(0x7f0000000140)="22ffbe6c425721abf9438468890be7cd3b8e8aec786070ff0382ce5360acd8111387293581eebe29e4a6475ac82d151865da224f4c4b391eacaf53f356d4b18c2ae5fac795a98e2dbbf9b91d38a12e73d428c3b1358f6992d513560315e3802884a120b0668fdc9dfddc603ff420206926afc21679f7998cf52a532aca152d186f95bbbee034cde103b093a1aebb1f498c256b0a850c329a913e00918db115eacab319b5f6710ef8020cd59a8e805c19b6599d46d24752dd99726f7a865379eee33a07dd9e7769d8889c377ed5f2c041cdd41278652b145b3872adc31e2a3e0a7c40e545c75db4", 0xe7, 0x3}, {&(0x7f00000000c0)="413bcc53263b44cee78d0bb300497a3b80342d22", 0x14, 0x7fff}, {&(0x7f0000000300)="7bb2f65b034f4611500b8f98fd472217d6bce234caff269b2949aef35e20cfaca41cfe110b86dfc06e8d7e126aacd0743d9eaa3d394ae022f79ab5cdd65af3c4737a20c90839eb0e189db6b34c802d4d878334c06d4ef86ac9329eac0484cfa20c0eba666ecbde7569af43b46f1b723ff718066317c4d97de005ecfd156692ee81af69fec73cc4a9f87c213ea0d5de14ed297fa0eec725d4c4793eb2ac741fbbf5e853c237870ef891bee234d1c929f46a3bb44db6efd53c2d43e6c77830e4b44034b149e82b63ca3b648d808be308adfcd7c7fbc2b4633f3d6109671430", 0xde, 0x3}], 0x0, &(0x7f0000000400)='\x00') [ 453.844433] audit: type=1400 audit(1556719319.091:321): avc: denied { map } for pid=15942 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:00 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x40000000008000, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$TCGETX(r4, 0x5432, &(0x7f0000000040)) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000180)=""/14) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$KVM_GET_PIT(r5, 0xc048ae65, &(0x7f0000000300)) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 453.944979] audit: type=1400 audit(1556719319.101:322): avc: denied { read } for pid=15944 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:00 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x2, 0x40000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000300)={0x9, 0x1, 'client1\x00', 0x9e017e3177effc2, "fe72eeca31fd9d92", "a9eb534424da6129d694152b5432de141faad6837bda407fd2927f11421be8b9", 0x120000000000, 0x80}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6c40a2b7b294b87a49c0b9a76297ac2fba283b542f74d70900000000000000334a33509ee5d31701130ab2af6e8484dd4ee52f1cd2f1ca"]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) mount(0x0, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000280)={0x0, 0x9, 0x5, [], &(0x7f0000000200)=0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x403) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) write$P9_RWALK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="090000006f01005100"], 0x9) [ 454.045912] audit: type=1400 audit(1556719319.141:323): avc: denied { map } for pid=15942 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:00 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='mountstats\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x4, 0x19d}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000040)={[0x0, 0x7, 0x1000, 0x8, 0x8, 0x3, 0x3a2, 0x85f3, 0x3, 0x2, 0x9, 0x3ff, 0x80, 0xffff, 0x101, 0x3f], 0x100000, 0x228401}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x4004510d, 0x0) 14:02:00 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x26) 14:02:01 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000140)={0x3, 0xbdb, 0x2, 0x100, 0x1b, 0x54}) 14:02:01 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x4, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:02:01 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2c6, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) 14:02:01 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d004c5fac4aad00"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9d, 0x180) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x1, 0x6, @random="57516fbf61ad"}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r2, &(0x7f0000000480), 0x100000000000000d, 0x0) 14:02:01 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x7, 0x80040) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000340)=0xffff, 0x4) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffffffffffe0, 0x200000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @empty}}, [0x4, 0xf237, 0x1bc, 0x79, 0x1, 0x2, 0x6, 0x9, 0xc0a6, 0x7fffffff, 0x5, 0x18, 0x6, 0x0, 0x1f]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0x64b800000000}, &(0x7f00000002c0)=0x8) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) mmap(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x4) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$bt_hci(r5, 0x84, 0x22, &(0x7f0000000200)=""/127, &(0x7f00000001c0)=0x7f) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0xfffffbffffffffff, 0x2000000000032, 0xffffffffffffffff, 0x0) close(r4) 14:02:01 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x90000, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000380)=0xffffffffffffff4a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x62e) r2 = socket$inet(0x10, 0x4000000000007, 0xe7) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f0000000200)={0x9, 0x9, 0x1, 0x400, 0x4, 0x7, 0x0, 0x5, 0x8, 0x71, 0x2, 0x9, 0x3f, 0x80000001, &(0x7f0000000140)=""/157, 0xffff, 0x9, 0x6}) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 14:02:01 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:02 executing program 3: readahead(0xffffffffffffffff, 0x100000000, 0x5) write(0xffffffffffffffff, &(0x7f0000000100)="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", 0xfc) [ 455.671528] IPVS: ftp: loaded support on port[0] = 21 14:02:02 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x10001, 0x0, "c50d28a71b90feecc47829f8b112bd4a5460de39414960646dc244646c3afce1c1f46acaabd401ee12accb770765c3532dce45e2f75c18fbdd27584180b0d22ed551d474e948294cdbdd4e15e517b46b"}, 0xd8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x3, &(0x7f00000003c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) 14:02:02 executing program 0: setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x40046109, &(0x7f0000000000)) 14:02:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={@remote={[], 0x3}, 0x6, 'veth0\x00'}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000a8000000c000000000000000d7ec0122f3f967557760154cbdea8d8b83c531ed90ef5600f9328deed64d8015542cc0783205b82c05d457acb1d392aa45d276a4530d11bc2cb56c6bea39057dc4f5ed6c1e71f57757b6ca639b48ea38369fdd2b83dda0068124b0f65579eb31f260560a976a7bc24e1fa8a41fb45dedc9fa27aca2bd0ba7fa5850deaa69caf043a9c4d7a445d571ab384ea61cabfe1633f4715120000000b155dd165e52a22f2a37d4d48f0000000075b2a186ccab607e20f0ff06920dd37f42f445d8efd877b38e0c014a2276c80d8def1b2aa9c724d769ac5054aaa04ad082"], 0x0, 0xf2}, 0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:02:02 executing program 3: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6bf, 0x10000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x1, 0x18, [0x1, 0x6, 0x80000001, 0x7, 0x3, 0x1]}) ptrace$setopts(0x4206, r0, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={0x0, &(0x7f0000000080)="9102532dbe2cecc28275fcc92430702238c5d897aceb6fb60bfc9a21fe9653f40675174784c03f51969dff4296c894bbd29a5bf798522770a3d3cd"}}) ioprio_get$pid(0x3, r0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x80000004, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x29, r0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000140)) 14:02:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) fcntl$setlease(r2, 0x400, 0x2) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) close(r2) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r4, 0x712, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) close(r1) 14:02:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x1ff, 0x30, 0x2, 0x401}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x8}, 0x8) 14:02:02 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x4000000000000000) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000018fe7e8001c05f", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x3, &(0x7f0000c91000)=ANY=[@ANYBLOB="850000002a00000057000000170000009500000000000000"], &(0x7f0000000000)='syzkall\x86r\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0088000]}, 0x48) 14:02:03 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x141080) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000001, 0x100010, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r7 = syz_open_pts(0xffffffffffffff9c, 0x80) r8 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$VHOST_SET_VRING_CALL(r8, 0x4008af21, &(0x7f0000000040)={0x1, r6}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r7, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000380)={0x0, @src_change}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r8, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f00000001c0)='IPVS\x00', 0x5) 14:02:03 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:03 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xacc}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @remote}}}, 0x84) bind$inet(r0, &(0x7f0000fc4ff0), 0x10) prctl$PR_GET_DUMPABLE(0x3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x5}, @mss={0x2, 0x9}, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x81, 0x10000}], 0x6) 14:02:03 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) tee(r0, r1, 0x3ff, 0x4) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock2(&(0x7f0000558000/0x3000)=nil, 0x3000, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:02:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010907031dfffd946fa2830020200a0009000200001d85680c1baba2046277be", 0x24}], 0x1}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) [ 457.382963] kauditd_printk_skb: 185 callbacks suppressed [ 457.382973] audit: type=1400 audit(1556719323.891:509): avc: denied { create } for pid=16090 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 457.420512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:02:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40300}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040010}, 0x40) socket$rds(0x15, 0x5, 0x0) [ 457.506508] audit: type=1400 audit(1556719323.901:510): avc: denied { write } for pid=16090 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:02:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f61fe4)={0xa, 0xce20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockname$netlink(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xc) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) sched_yield() connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) bind$inet6(r3, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 14:02:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) accept4$x25(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x80000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000340)="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", 0x1000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x1, [0x3ff]}, 0x6) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1000000000054}, 0x98) [ 457.654831] audit: type=1400 audit(1556719323.951:511): avc: denied { map } for pid=16087 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:04 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 457.790425] audit: type=1400 audit(1556719323.951:512): avc: denied { map } for pid=16087 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:04 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) fcntl$getflags(r0, 0x40b) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000380)={0x9, 0x2, 0x5257, 0x0, 0x0, [], [], [], 0x7ff, 0x909}) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="004329bd6400000000000d08000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 458.001859] audit: type=1400 audit(1556719324.071:513): avc: denied { create } for pid=16090 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:02:04 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x200000, 0x0) readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000440)=""/17, 0x11}, {&(0x7f0000000480)=""/32, 0x20}, {&(0x7f00000004c0)=""/75, 0x4b}, {&(0x7f0000000540)=""/76, 0x4c}, {&(0x7f00000005c0)=""/230, 0xe6}, {&(0x7f00000006c0)=""/96, 0x60}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/78, 0x4e}], 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xf}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x2000) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xf876, 0x600903) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0xa100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x400101, 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x36) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x10600, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$RTC_AIE_ON(r3, 0x7001) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x121000, 0x0) ioctl$KVM_GET_IRQCHIP(r5, 0xc208ae62, &(0x7f00000001c0)) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7fd, 0x0) 14:02:04 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x3ff, 0x4) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3ff, &(0x7f0000000180)="0adc1f123c123f319bc070") r1 = socket(0x2, 0x2, 0x0) r2 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000005}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xa8, r3, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100}, @IPVS_CMD_ATTR_SERVICE={0x74, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x35, 0x6}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x14}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20008080}, 0x800) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r1, r2, 0x0, 0x10001) recvmmsg(r1, &(0x7f000000a100)=[{{&(0x7f0000009f40)=@can, 0x80, 0x0}}], 0x1, 0x2001, 0x0) [ 458.161132] audit: type=1400 audit(1556719324.111:514): avc: denied { read } for pid=16075 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 458.260642] audit: type=1400 audit(1556719324.171:515): avc: denied { create } for pid=16089 comm="/dev/vfio/vfio" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 458.401158] audit: type=1400 audit(1556719324.231:516): avc: denied { write } for pid=16089 comm="/dev/vfio/vfio" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) write$rfkill(0xffffffffffffffff, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) modify_ldt$read_default(0x2, 0x0, 0xfffffffffffffc8e) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='/dev/zero\x00', 0xfffffffffffffff9) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0xffffffffffffff49, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/49, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffffff0000000032000000000000000000000000ffff00000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000200"/240], 0x1df}}, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(0xffffffffffffffff, 0x0, 0x0) [ 458.621145] audit: type=1400 audit(1556719324.261:517): avc: denied { read } for pid=16089 comm="/dev/vfio/vfio" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 458.817819] audit: type=1400 audit(1556719324.301:518): avc: denied { create } for pid=16075 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:05 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:05 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0, r2}) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="91ee01fc168153d595ccf16f2c1238f7"}}, 0x24) 14:02:05 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 459.387087] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 14:02:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) ioctl$KVM_NMI(r0, 0xae9a) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, r2) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) r6 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r7 = syz_open_pts(0xffffffffffffff9c, 0x80) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000001c0)={0x100000012, 0xf7, 0x6}) r8 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r6, 0x10e, 0xa, &(0x7f0000000180)=0x4, 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r7, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r5) close(r5) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r8, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:06 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0x3ff, 0x4) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 459.854844] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. 14:02:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0xb1}, 0x3c) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x3, 0x0, [0x0, 0x0, 0x0]}) 14:02:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000100)='./bus\x00', 0x479, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:pam_var_run_t:s0\x00', 0x9, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) 14:02:07 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r1, 0x0, 0x1c, &(0x7f00000002c0)='wlan1ppp0eth0ppp0ppp1vmnet0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r2, 0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000002900)='/dev/capi20\x00', 0xa2000, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000100)={0x2e, 0xe, 0x1, 0x19, 0x9, 0x800, 0x5, 0x2e}) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='./file0\x00') r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) poll(&(0x7f0000000500)=[{r4}, {r3, 0x200}, {r4}, {}], 0x4, 0x7fffffff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x1) syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x4, 0x2) preadv(r5, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="82015462fe0de419ae0f6bf7f8a1424b3e64b7fe08859b623488918d1311177ab85048594ee4c60af66db1f78bb53fdbd7f9f49da82ce866084927f988077d86b8719d3bfe4cd08d2b3e0029a22ecc06b168089439efafd409b53263ad4db0a73e22a560", 0x64, 0xfffffffffffffffd) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, &(0x7f0000000000), 0x159, &(0x7f00000002c0)}, 0x0) 14:02:07 executing program 0: syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = semget(0x0, 0x1, 0x200) semtimedop(r0, &(0x7f0000000000)=[{0x6, 0xff, 0x800}, {0x4, 0x401, 0x800}, {0x0, 0x1, 0x800}, {0x4, 0xaf, 0x1800}, {0x6, 0x1ff, 0x800}, {0x1, 0x10, 0x1000}, {0x4, 0xc5, 0x1000}], 0x7, &(0x7f0000000040)) [ 460.730786] SELinux: Context system_u: is not valid (left unmapped). 14:02:07 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r6, 0xb}}, 0x10) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:07 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x3, 0x0, 0x0, &(0x7f00000000c0)=""/10, 0x0, 0x4001}) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000480)={0x2, 0xcd, "a22e89ad572b1eb60de5b839b77f5f926bf484267d27b3198f3212c81667420effa9ba5b590893697321d9eecb20443c389fb45b9bfc31912b9c17a327ca2accb6a39451849229c5c7b214a1e635a69a059d5e5a7c63874a72758520851e5c8c154734dc4a450070ed1f60dd5b4d63d9ba10458fc0904d7301c6025e219a0dde215caea9fb25ad078eb7305a2f036c65c30baf2d750cf9dd745c1f170dcea3b84c0f3342f38fbdaab90f38b475784415ac02319b3680cfc1f1772cf8b7543a132480956a560993186c63c9ac19"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mq_open(&(0x7f0000000080)='/dev/btrfs-control\x00', 0x880, 0x20, &(0x7f0000000100)={0xa6d, 0x1, 0x9, 0x9, 0x1ff, 0x0, 0x2, 0x3ff}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x0, 0x1, 0x0, &(0x7f0000000140)=""/118, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000001c0)=0xfffffffffffffffe) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400440, 0x0) r3 = epoll_create1(0x0) accept$packet(r2, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r4 = epoll_create1(0xfffffffffffffffd) close(r3) r5 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x9) setsockopt$inet6_dccp_buf(r5, 0x21, 0xcf, &(0x7f0000000300)="5b6972dfba4d7ad102e52cbe152b33edbafca5cd0eb817be98a08d1b96972f98dbeb72e99e089c9f5b9bac00c0c75985a7ae86c1e83da316bc2568f58ea49950f6eefc3f87521b3907f58c7eb9706083fd0cc3216749f08eeae9e6665b7a663ef2d736a3c66ad1f6c588306fefdd98d1ae4a587a35e2070f8bab198a17a6a7e8d3b3305709940e7d4c014341d40752e4875b9ff5d32ac3e2d8aecfd9f2d066357ed722548a2ab66a67700bf085784c0629b65c89f5313a3bfcc8f1613624b5c0a73dd5ebd0d425ff210ccbe24c11dd4625695ceebbd25f4dc6fbc1a1c2d1160c0fa26276b67c9796a7d5ef6069e4", 0xee) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000280)={0x5ce43cb1, 0x20, 0x7, 0xf9f, 0x100000000, 0x3}) 14:02:07 executing program 0: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x7ce, 0x10100) futex(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000080)={'sit0\x00', {0x2, 0x4e23, @multicast1}}) syz_execute_func(&(0x7f0000000440)="0f01f94a2be966420f72f0f5980f0578f3aec4a37bf0c50341e2e926b5c9f34a0f38f60128218d00a30000262ff342906646da4e32c422cdb616c4611dd919dec4c6c100dc55394848172525000e8167470fc980008065fc9ec4414d550b8fe97c810f67f2460f2c780dc4c2858c3f8fc4a1c573d1f6c4613fc21d9053c7ab86c4213e5377000043d9f365470f8b00000000e11a59c461dd146139438f34b267f36ab40f68803000000056d10f5161c366400ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b100000081660fdf535454c4c4617b708cfa0000000000746650c1f043fe02660f38de8e85e1f32646dec43b7d0f18e4a7e4f436420fd7c2ca30cad8358b000000bb3cbb3c0209912af3430f47bb00000000000045dc0f845000f04781ae00100000f1000000c44258f313d800d800dd4805ffdd63a5b76e0b0ba17ae64295589cffffbd7c2d83004577cb0c0ce42ec4a17c1002c4827d131f0606b274c482fd245c33009b838f09e89a5b00ddfafa485cd15e532ec4c4f6c4438168c8022cb18375fb0a07c40155f61806f20fe6b265566666ec47f1f1660f38058b97619236c421c96b82e2626320979747910002c1045c0b47cc5cdbed44ddc944800199bb00004242c4017d50fdc8d4e6d4e6eeec36662e0f4b00617ddd880c003422") 14:02:07 executing program 3: memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x10000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x1000000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) madvise(&(0x7f00009b9000/0x1000)=nil, 0x1000, 0xf) pipe2(&(0x7f0000b57ff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) madvise(&(0x7f0000b9c000/0x3000)=nil, 0x3000, 0xf) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="040badc0f55df1eb842c2515df1c03d7d474aa6e73"], 0x15, 0x2) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x135, 0x1, 0x9, 0x7ff, r2}, 0x10) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 14:02:07 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x7fd) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r1) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:07 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000400)={0x1}) r1 = getpgrp(0x0) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r0, r0, 0x2a00000000000}) 14:02:08 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x400000) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000329bd5500000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:08 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={0x5}, 0x8) readahead(r0, 0x1, 0x583) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) mknod(&(0x7f0000000140)='./file0\x00', 0xff7, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/4096, 0x1000) execve(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0) 14:02:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @remote}, &(0x7f00000005c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000600)={@remote, @empty, 0x0}, &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f00000002c0)="cbf72cac10af95baff80529ea65436e456ac093f280bae333e14384aa4a0950fa698cc1d2b62d76fc90ca13bfd3dcd1b035e4cbc227e0767a5045712e8a3eadb056029493d562994fd7d3b63596261e625042042730a139c2da3dff64a7d5ebe73b9fc32218e9f1702ed381262a1a127e1a39b78cbb451b24a314aae230923191ec2a7a64dfb2e756b87470ba03d54b6e50fcd3d606766709ef59f61b3c42dcf283a4b75d61f88884c0b658dce8b108f2df6abee69d27dc2e352cdec7232d2045a419705e266acc9167fa36a5f547936f6", &(0x7f0000001ec0)=""/4096}, 0x18) getpeername$packet(0xffffffffffffffff, &(0x7f00000011c0)={0x11, 0x0, 0x0}, &(0x7f0000001200)=0x14) r10 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000400)={'vegh\x11\xde\xff\xff\xe6\xff\xa1\a\x00', r11}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001700)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001800)=0xe8) getpeername$packet(r0, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001880)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000018c0)={@mcast1, 0x0}, &(0x7f0000001900)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000001e80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xa10}, 0xc, &(0x7f0000001e40)={&(0x7f0000001940)={0x4d8, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x10c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x268, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x8, 0x20, 0x1f, 0x9}, {0x1, 0x0, 0xf65, 0x1000}, {0x8, 0x0, 0x7, 0x3}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r12}, {0x138, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x4d8}, 0x1, 0x0, 0x0, 0x400d4}, 0x20000000) r16 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) dup2(r16, r0) r17 = dup(r0) r18 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ftruncate(r18, 0x2007fff) sendfile(r17, r18, 0x0, 0x8000fffffffd) 14:02:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x8, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x84, @rand_addr, 0x0, 0x0, 'sh\x00\x00\x00\xd0\x00'}, 0x2c) r2 = gettid() capset(&(0x7f00000000c0)={0x399f1336, r2}, &(0x7f0000000100)={0x2, 0x10001, 0x9, 0x0, 0xfffffffffffffffa, 0x8}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 14:02:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x28175b87, 0x8000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000340)={{0x10000, 0x5, 0x4, 0x200, 0x120000000, 0x60000000000}, 0x8, 0x2, 0xfff, 0xffff, 0x7, "8ccd8c6b35a97ff4074849e73ccf4817bec97510b663e27bb6c936313ffc3a0c0eb0b3b5a39650b12b92ddb93a7ff56b7a70f4f6c99ff7b0b9a5f06ffd26de2403c22d7023a3db041d1d7c22bc36a2f79e30f3cf09fb232840aa77ae462a92a94eda3008697336de5f40534f71815367daae1fda6a556ba2826a3a1d07b8595f"}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000240)=0x1e) setsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1b}, @remote, @remote}, 0xc) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) dup2(r0, r2) 14:02:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) 14:02:08 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x7, 0x200}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000000000000180100005802000098030000980300009803000004000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="00100000000000000000000000000000000000000000000000000000000000000000000000000000000000001c00"/57], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e46515545554500000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaabb00000000000000000000ac1414aa0000000006000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaa1600000000000000000000ffffffffe00000020f000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, 0x1c) io_setup(0xff, &(0x7f0000000640)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000001080)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f00000011c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0, 0x0}, &(0x7f0000001240)=0xc) sendmsg$unix(r1, &(0x7f00000012c0)={&(0x7f0000000a80)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001000)=[{&(0x7f0000000b00)="ede7de00ef1aec97bb569576dc0073df28e694285905d3080b6a2a0010ed1a1d9c26a5316376972f1b3329eadf31cbb75ec1d7d574e898933b8142570422c46fc81ed5952d26086e550456779b161523bfcd057c0a3c3be3ee23527224f75b6d1c0524702de83832e54069aa0982c3f8a628eff9", 0x74}, {&(0x7f0000000b80)="b8681a1c9284e94e7fc97360b5078327496a854b72dc1f6815e9750ef2154d6231c799831ced48b58a1b00e43fa2b55646f71a3679a412df82c1ff7ece90eb2bac097bcac752abd5537d3ca08f434a49a6edbcb9b03baa1b324846c573a167f932e2dc8d56821668ddb81211590671dda064bd2161aab07c52a5e2387c1d146343bdb67d9e5e08f5f8bf79ee14f2bd0358c258474252e36aa684c027eeb6943c42a5b208fbc49880da2e018a9def076c7f208f1016ba5176306800a3594148c1d92652a47087d40d36777dfb87257d1f3606ccf4fc6f30", 0xd7}, {&(0x7f0000000c80)="875fe33e233fd425bd557e1e354af1c1fbc02ada4636948fff1bb5f56fad64f4180e7c739de0fb80215003182d05d77ff2b760e114a899764422372da84c3f595a456f41cd65121d2a66c22cc60bc31aff41d67608c2b11c520aa4d5b97b7a59f72f0595bc67c40d7bbc0008b8d78c2f396e1a5791d956ac19c4da9c2296896e3aafb0bde3d6b6b528629d5c301eeacad9959dc9546beeae30449e7be1a75376d4e6a807c56fc3db3d1416915489bd4462e158043869b27fa4", 0xb9}, {&(0x7f0000000d40)="c76860438773b79a9df3b8067e7334b8c544006f4b57a36ccfa457f8018fd38b7476802b16c385a0e4245fe0aa67e63cec8d42287d47567d849c10760e81fb25112e45c671056ea0a132147068fe4083daa5cd0c97874efd2abbfb2aba34327e911572d755231a2fad4f41ffba002ba2108c4a8b994a71f20bccfc2eaa0b3035e4e5649956c82c497aa7e31ab89c275af118155d2fef7396493cba1674a201d842e9cb901f7b4c13b2ecb1d56fc52e9c302698807e685deeceee4d047625c683ccb0", 0xc2}, {&(0x7f0000000e40)="3205d32e4a4170c9ac49c3eba15ffdcfefb733e42c403c019b3fbcc445085f", 0x1f}, {&(0x7f0000000e80)="eb2c853287314c31e6316bc3545a13895d5d0b66dd11b6b92970d74abcc23171442fe4732d496c2798971ae59de317b701e443e174c02faeded3f88c4634bff90a66028734865811e9f4512f933d70caf67e85891c020b1296b83e332561f9656ae1c75ac7f4acdf031b0aeebfb486f82ca3faf46db8aa5123ee80298e33863ee33a6d60ad32b6f8cbff6c437461f212219c2d6fd10fd0ba7c1840f54b2ff38bb9b3e4f24ed21b9304421b", 0xab}, {&(0x7f0000000f40)="deedaa68b0adaf0fb50b573a16d19cbd122d97d51d61786cf2c0372333abc6514956934a467bb0f024bb9e4a941bb08efadcfacec96f6f55793ef389a430706d8014197bc7c0869301d9f2102bfbb9423e308598f64a6ba2c3c705c7885f07a1af42b3aedea18591d621ea62acc5ba8460a945c52119e29a12bf7200fd07832bdd88031d85918cf22309492e20891f4d94d49ad7", 0x94}], 0x7, &(0x7f0000001280)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20, 0x4}, 0x24000004) r6 = syz_open_dev$radio(&(0x7f0000000740)='/dev/radio#\x00', 0x0, 0x2) r7 = fcntl$dupfd(r0, 0x0, r1) ioctl$SG_GET_NUM_WAITING(r6, 0x227d, &(0x7f0000001300)) r8 = syz_open_dev$mouse(&(0x7f00000009c0)='/dev/input/mouse#\x00', 0x9, 0x80) io_submit(r2, 0x3, &(0x7f0000000a40)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x3f, r0, &(0x7f0000000680)="52c9b28cb6c43b6c626bf8604ee6192a61227fea9ae957fb2e708cb57252313a78fb43e1c9e23570326e045bf1f7e66deb655d243a6937672dabbd9deea2d8cc53482f869342ae0c43a1a28ade0e8bd9cc45f40af6ec66e075cc11127ef0188a97d2e61c1e355b1e94c02371dbaecf975d94dbac5089e577b0164bbf857bfd06294a652dfa045b177ca9741982b8ba9f5b39d371", 0x94, 0x3, 0x0, 0x2, r6}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x7, 0x9, r1, &(0x7f00000007c0)="1c833ad979aedebf45f89473f9a8df183c37363bbc2074a57761c5750c7ec3a408cf8437902b8a154b23cf1ea987f933fba04c1eaed9e7be8d1191cba390b52b8ee0343cb1ea1cd255c74881c3fbb7060af320bda5c0e7b0fdac0aeb7b1ad2c1d6faa54ad82dda12c0714475d9aa46cac0d6d3d9562168164067d6613e006a67e0b62fb0416f65405e1a6a4beadb0d630de01f97e33b10d24010b5a422560df6b1664ebb80674ed8a308c7ad66ac1784a5ebb94089164b647db30fe54a41f63670469df4db6abf1e3ab04f09379d729073ba172bbe604abe410ea9f618cbb6675127a69a34db9d3bf3245e3cf958ac10", 0xf0, 0xffffffffffffffff, 0x0, 0x0, r7}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x2, r1, &(0x7f0000000900)="2463f0da90d10e8bc5e1ebd4bfe076b9e9eb5b0516ccc884f2744eeb8b7021b8cc33c5cfdb2f215519b26dc684a2ca8f14c4adac776e9c8801ed2a000f4910d5d0ebb41bbc73102da08b6c0f3aa6e3abf474cf97904fd855b203f47b4d6811255e91eb981bd396adbffde63ad957f430a9d940f1bcfe1f871b544f3be61d6f2369606a4ac8fac886aa35b5aebc1aec75726095c8c7977b7d1810", 0x9a, 0xe95, 0x0, 0x0, r8}]) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) setsockopt$inet_udp_int(r9, 0x11, 0x65, &(0x7f0000000080)=0xa003, 0x4) 14:02:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000300}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x880) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0102070324425134c1b900000000"], 0x14}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x200100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000180)={0x5, 0x2, 0x8, 'queue1\x00', 0xc2c0}) [ 462.412506] kauditd_printk_skb: 202 callbacks suppressed [ 462.412515] audit: type=1400 audit(1556719328.931:721): avc: denied { map } for pid=16238 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 462.556860] audit: type=1400 audit(1556719328.931:722): avc: denied { map } for pid=16238 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 462.697682] audit: type=1400 audit(1556719328.961:723): avc: denied { map } for pid=16238 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x2, 0x4, 0x400, 0x80000000, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0x2400000000000}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x100000000, 0x1f, 0x0, 0x10020000002, 0x0}, 0x3c) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8602, 0x0) [ 462.922561] audit: type=1400 audit(1556719329.021:724): avc: denied { map } for pid=16238 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:09 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$setsig(r0, 0xa, 0x11) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x40b42) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 463.146675] audit: type=1400 audit(1556719329.021:725): avc: denied { map } for pid=16238 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, &(0x7f0000000300)) [ 463.331213] audit: type=1400 audit(1556719329.171:726): avc: denied { read } for pid=16227 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 463.354276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 463.371743] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 463.405676] audit: audit_backlog=65 > audit_backlog_limit=64 [ 463.414063] audit: backlog limit exceeded 14:02:10 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x129040) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f0000000380)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) syz_read_part_table(0x2, 0x1, &(0x7f0000000700)=[{&(0x7f0000000640)="0b0a5162794b8735336e9f9a6eeb835aa38ad552e4989429fe1f44e082f44ecbc2a8aaf4f2e16330dffed7eca181ff6599a874dcdd05144d4ae46afcddcb205e7261dee5201ba7081cebbcae6001de89e80391dbdd39b420e0bd0be173b3c5dbb755fefa566949755357bcf4056582336b59a597a020ba0438aa104ebd2223a88bc024aea1b97b728ed2d99d4ee068ab2d4ae707e2d50af26f4a394a3c93", 0x9e, 0x1000000}]) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0x4, 0x9, 0x3}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000740)=[@in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @rand_addr=0x1}, 0x7}, @in6={0xa, 0x4e20, 0x100, @rand_addr="61be5f898c12785aadf2c02a0ebae7ba", 0x40}], 0x38) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) recvmsg(r0, &(0x7f0000000600)={&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)=""/225, 0xe1}, {&(0x7f0000000480)=""/189, 0xbd}], 0x2, &(0x7f0000000580)=""/104, 0x68}, 0x42) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x7ff, 0x80000}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0xa350, 0x8204, 0x400, 0x7f, r4}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)={r4, 0x53, "cca58388c48d337fe01c2291e4452545a814d1415fdcaf14891ce885cb50be5ce58e2b2210bd5ad0d8a2466f34ff985a40a8f1c389f36fa47e6e64dd1e24f9b890b67f9b6c2ecc63df9e77fe5643809d9c4da7"}, &(0x7f0000000240)=0x5b) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000080)={r0, 0x1}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000000)={0x0, 0x6}, 0x8) close(r0) 14:02:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f00000004c0), 0x400000000000251, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x6, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x800, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000240)={0x57, 0x0, 0x5b12, {0x100000000, 0x100}, {0x100000001, 0x1}, @const={0x6, {0xfffffffffffff65c, 0x0, 0x800, 0x80000000}}}) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000100)={0x8000, 0x2, 0xfffffffffffff001, 0x2, 0x40, 0x8}) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000140)=""/182) 14:02:10 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) 14:02:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x4, @local, 0x4000000000}, {0xa, 0x0, 0x0, @local}, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff]}, 0x5c) 14:02:11 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)=0x6) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000), 0x0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:11 executing program 4: r0 = memfd_create(&(0x7f0000000140)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x3}, @result={0x1, 0x49195ee7}}], 0x30) 14:02:11 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x80) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000180)=0x7fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x3fffe}, 0xc, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:11 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000540)="c000732766269656ef63ef4bc5b37f79d2a46a70be910a6bf3fd8d1531525d55066a98de0c20e04ea886b9a0ccb919ca350e8af13e35ced2652644313e6e0ef12f2e1295e1dbc3463dd64daa9722cb7ab2cedcbf3d9a596ac9d9800c3a1b10a335065ebde62dabbb3dffdb1d40a3827b0847541f3053ef20a6ca4a2c7d0ee6895b122ef720e6486196408960af128479be6c1be1d8830dbf4a743b6d94742d6eb826956eb1230f2182c04809f6b4afba853d5d420b45ee5e224e7d1ab213d3b4b3750ca7274b7165c5628445a0d20aa81f2f6ec8f5d25a10f7be2c56aebfc73f108e41817e86758dbb42914353dd964929c2b1ad3b68d289846995c4e61daf28311c573ed6fc977a0176744e7e8b45cac52417da16569c7c2de37077dd2c15bc7f1411acef56ec425286f5d3113f6c964b1311a23a769272d419960f6527bae99975b3bd792004b5d5e4b622af5f84bd4168130f9d0444e7524d2f9f7bde3f771923202955479b44d642dd62988052c0bffbd2895206e2a7bb2ae6a2e838befd00b76a2c0d6dda28ba6f580b8b5f870843b7dd381daa10f1176bba4bb4bdd1911e5a760b74f10291ac0d68dbcd4785792e2b78a769de663202d0387c1c1c43b81b1bc980c1be6ba48ed305cb7aa96e0cf09a6af73645a4816a8d1b4c5e77ccafbe397f92ce136e8c98b675fffe8ba1cbe91c93a0d51aa88d8ffe172d11735013346bd0f0176ead99028196170ba8ad1aebaa231990ef2d24646f7b4d4f4f4de959905b27cf4a7bd15b0d3c8087a418d00b6f4ad01e032cb7452f9872a3295092e2d8d9f7e0bb40fe6ac46b6dbff07768996bd063dec0b65994040640f4993745bdb5907936335a344a4198f552fa58111c8493dfbb60b38e4163580eb5f6d6582b58dadfa933558a2d75cbb25c0203f30c8aa9a961dc403f4effa1977a9a51b636554cbf14e0f04dc86415516e8037835ffa1ab4a6ce5ccc6a2d19a3f7deebbb808ce95fd41599a432deed79209f974cff6f3bf9d3b0df126fd9ff82d96033c91f1e928bde7ea73ac1f4eeca5ee2f18b1cda1b5815dcd3b801d32409742cf95af27e8a45c3e53b2a4ed8080ee1c02dd55192aedb3505cdd0e7809c492bdf5c618ff8524a650255f286e9b51c205af86c18c75950fa2a5b73908864eb404ee3295f4df0c8569490e7fad673eb50397379549485155fb244c467ff89528b6e19a885f0aaa75f753ab8cf095384cb3964fd69d58fa6cfd2b08717bbb9762168b6d7252e318336a7a305153637694e218d216c3dfb14553ba52aa4c48530da17eb9c69c04822ca65911523042150f6ff57931f4a65eac358c8439bf704902fadf750a7802470fb4112320e4890b224499eabb752163c65b6bc55ce1981d5b1de9d98046a9b4867add89a81c7e48ae261687781fc56b035ee6fbea67b40a28730740fe593e68f4a186d7fc669aff151faa527866a25f4232a183efa8654252b257948f11a126f99a1aa5ca3ec4b16f299ec4dfcfaf088900983c080a2351393ed09b6a5985a276468b7f32905876276e21acc45f3edc6e2fe2120e61203845fa04da8e524849d840d4c4746fd1795fa39890452a90a3a978d9a9f284a56a3d41822be8dc4fd5ff14aa40b95543b401a3939c2466ffe4f86625ee835ada8db939eb36ffa4534dbcf963910ee10324421518085073a2326e380bf261a2a4415ea2e451548b0c49b1e1e8d138534ec578b88be14d53a5fdfd0afd05396675745a9faa1ca039132bf6fbb41eaca9accded7b5d2a923ad13fd24a7ec2799235f5f2433179fcdcdbc6a91253c3823bbcdae22bfb4d30a00478c5ea7e4d8ace00ca6cf3cb525b470c9f909bdce4a1de8ff74c4c27178b82c14e52078b31935a36f247625630b6b8e85ce07384445b56e6d94f685782691c1f06f043721b8c74d0ffb8e703c0c4ad038b1ab1e2970f8ee20e5458d769e3a94ffbaa251dd34c7e2464275579a19fca5f4703ced802188dd6777fdcc853b86e715f7894cbd3494f9407b8ffd63980f373755e4164a59bfa999f81407170804805b938e145ba0107862beb33af90676b1e1839c1d398e2f6eae104f4f2baeead856936dcea5a5cf3eaa0dbf425fe44206be968673b4e58aced1a566371c0e08ffa687fb15e5e5ae50cba6f6c3513b6a6bd0de63b6bc102bbb74555f7cc637ea32b880c35969d82f274cfd5b1a0f5c542e7043ce70d9f3203c9231ef6ee76c78caad2fb0c5139d639ebdb153615a76e254757b92f81235e11a2e5185df9de408c23fbabc77f6eac0f511f4c56a955eb977503b8871b7e721763f60f53497c37770c45cdbc45d23f64c134b0abed667b84c04995b4dad812112f839dc61a49614ed2d8579bfad00c3bdf1fa6407832bd3e00f79604040e73a1b5cb75eaacaa88bfdfd1a530637306bc32df89961affd2d881ddfa1da5ba19e270d5df73d3f4caf81ec791036bd61d986118329720db973e73747de11da3bf90a7fc447f804a653415645f8e55be99333a964431aa716533cda761e3526d4f6e195ecf8764859758d91b35e22dcd73a70d15f83a4910ee7aecdd69f516dee0c1c7ed7851a2ee496b30d40f29ec4705a77813c2b9139ebfeaa8a1debf1b0de382f7d9566250b7d24f6519a227f1fac59407a53859d7f6ab2c52dd0e0f9af1aa68da333b37a3e9f5e0104afe26d4964c72e1d0f9dab594c334169cd1aaa0e7a0bf6c1d80e7c378e94cd3224110f66e32490376f5f3f6d102599bb34bdbe04626f3051e780dd2e14ecc45013b181f907354a17eb279ab71578c3aea9397c762f1f8ca873850f00e9912c42c0307e0e2384e46a82b492573cf1a3f128669157453e40fd0f50aead93a089dfc1949c466e3539860ec2aa9114dd8b963a5c433e1a932c2bbe6b5b22ab96aed0698a79d6364d589f4827f17dbf0b57112dd197b10b45e98120aeaf537be73e423ba445f63c2db62a3e1ae4ff71eb554994b4a7844e3e2c1ce87347a041eba5328533d1d75f2e03d67358b86175e8f4d4b450df904b68cd95d9cf4cd5699c6a45f12a4ad1de41f28bff4ec3d692cdce44d21fbc606aa05a5f0d7e8418d217e17119932d477219c9a7143969f31ae20948c41c244547fd53e2bd4efc2375d2645478acb3a9c55880251752153be78c3dffd88468691a7e74aa0c1fbf5e2e853c208a6d97a06d7b33d8b3325b77b93695c69e0dde002f367c1d46e459286b291f286be813911b022f3b6217d4d98074af033f02d584818a91f1e5b88c531c11dba6ea419373a9dec025c5201b584f33b48e7144e61b745e5ab69786663e2c40f7d122648ef88a92576daa93bc68c7631e86204d7f80ef47ac7b71371e8b53b3419a427910911881e79060021a5ef37ec51b50ba59a6cd40c3efceeaa111d6037aa733d72cb7cbbc392d197d605abc176a40e4429738defbc0ca101a7da86d46db0f3771e42cbbe122968b9fb770167ca1fe5c0b430b80a2965f0e3a45e6171133a46b443cd19e8777a6675ace66d53a003435715bcd4f53fcb4d99191b499e990ece145cecc31499b8447b7780b9170ee0a3a347c11ac643d0be63069ea0b8668bad8ae73c125c06eec7c8551694e04e454e629ed76004b5417bb3f45e8c644c4c2b4c1fbdcb9cba17c187f6fa1ccdfbf84df67b7c293368634abd42005ea7c7674bef0530a9f58c8dd6a29dda22fd0312037b3bbd337cb8f66bd59404f095042df1abd94eeb529cebb3d1cc83368df497cf685b82b2444ada5fcbb25c6f5a24e2fa6c9908ff326df0c16c067601c2e14a878cb8838fcb43d5adbc8d0dc42fa5aa5e52a38d4659425ffe4f41aee94c2906fc3def6326be7fe0b0ad33ff95bbbae27312de3a23983790ab7c69bbacf0be6e8f44bd587396c1d5075b32f38034080f15f7f433a0f42defb029d672482672d620c9ea6386d8ba8a802cccf4b2372e1089d677cee2b760c52454f2384cc15cf2dd6fcf3babf78a22b3b79a9c73cb2595c0099d2b3ce81716b6ad17a2d7503449c471d2a155b2e76ad9bd7dd9e2709ff49f17607253ec60e3966064bd93b804214819df083411c760fc2c45249cb4ff99c094b45d7d66706f17e9133c1c3b85382e1f0421578471ab373ca70e444438533bd89f96209e56a72c6171474f9a930bf738ce404ee4ddc76927dfe94a014ff370c06c413ca5421e8ed9730974060817bf265aa281c1110973703806da2d55cd3e9d3700eb452785f0d2531327721d7ffe28ad3b1e2fd7347f459d772be4ab319c02102a044739936ced60eec506d806533f7b72235d00cee167f45d46b5d7765d4f0ca611a90223447b93de6c7c5713d14e172fc91c1d51a8c8a363b9500b93a7213ce9242361e0a8509df7f023ce78ece5b672207ca354afdfb85131605ef26e215e95c5ff6b2bd6514e36f0e1513397e6d88b4897cd2f46ad0f05760a33a1ac3f55e1643af08f395142ea04eafa3dfc6f7c246232a7fc231c37af906877b0843dcccfbe119c33333e36c3dc404c7659b754c8c988f191547e61cfff0701eefb0c797835db62b479f701f2e65d23437eac8dafcde5abadf422ee739e782409c3887536052eacc4db4ff36e84ceb525359a1fe945362f8741b32eb27d4c6517dc8721ac6d7c2098a085bbaf4a0d2f22be54859ff5582ce75fe9eb350e7aa13668f6ccb1db65bcff1e3306ed996fccc3a44ca233549199b2d0786b399a276eda26bf784ac7f0acb8de1284506467be9ae86479b08ff5f8794beb541e2bf822e460d12957764e5c637e86420087b4368fcc4884e57e7089fb58a355f06e2f01eb1a1fa5cb32b95ce17448d54bd6c2fd11117b6af1d8fe6da436c3edb6a53a70ca37998aa90c79496e993abf0effc4b24c3256ef2282a58c75f0a11829346c44eb9dca39a8a53a6c9801c92c0587f32859f8ca14ad89fd4c5ed0bf2b9ea7d5e6e3e822f9fb063e54c397175f0abf23b04228c7a9dcba76c9e401824e47b2cd21f10dd52030779bdd4be8c2fa7e5d10586c50aad770814b4399c0707f05a09a00afe32a95b2454776abb0d2f36f3b1682506cb3a94e82ec6f206f5639e10aff3cfb50eb4d8d888c178a95238b92aba7975cf2d3fa967a9f252c0e6b89a0350f995a9cf89e8df7b9995556bcca1915040e8613ec434cb4771d4ddb72e388b65f3a93cec8fe969e70a3ce66ec71c27cc542d339314f7ee7500b05ba27bc8e9bd266a4324e649f254aef0604d4cbedda73a35daffe1bbb15bfcdf93e519bf06f5ec7106d90fca521fdc162d74ee8190a95afecc2764572406269b33500dea20fcb94d4894ebb78e87a8c85b013992079a213e34354475c2dbe2a77dfcec6ef7336e4348ff59767fe56ba0d1248561a97ff437ba8629df9b9793d31ba5a92f9855eff4368ca131d5bf40fcd90c2635552d3ed7f4c60ca63a7f0e56aceaf5691e76f1045d8d1f9be6d3fb14a6062c4ceafc024728570d482b3a813694dc3e608ef10cf73e4248068029b37d5a1ba0ad3bd642257bf129893d61490e94f41f1d893b63a678cd0ae2eb261762b80d2607cf87322ded0610c532828337436d2260bf9db9f6992b17c076f8418d9183e7810f65a6d4f08bbfee4851dc42af158e2f7d60d58142ed95591f972233c7f805213b4a5de8368e2766b25abe91a063d4f46480c80c9fc7831882b9d53ee0c1a5ca564fcdca64ff4409467461eb3499dda4e5aea6c4b8cddfd53d5771cc3a29eddc6b42573269b6f181a0d7adcbaae3a619a86dcead135d20b433426113efae6501aecb", 0x1000, 0xe0a}], 0x800, &(0x7f0000000100)={[{@acl='acl'}, {@nosuiddir='nosuiddir'}, {@quota_on='quota=on'}, {@acl='acl'}], [{@smackfsdef={'smackfsdef'}}, {@context={'context', 0x3d, 'staff_u'}}]}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x5, 0x10, 0xb378d04, 0x6fe9}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r1, 0xffffffff7fffffff}, &(0x7f0000000180)=0xfffffffffffffe13) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}}}, &(0x7f0000000280)=0x84) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fadvise64(r0, 0x29, 0x40, 0x7) syz_execute_func(&(0x7f0000000400)="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") 14:02:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001140)="0adc03263c343f319bd070") mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x2, 0x30}, 0xc) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xe55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 14:02:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000200)=""/174) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x400) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2840, 0x0) 14:02:12 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xc891, 0x2) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000140)={0x4, 0x5, 0x8001, 0x69}) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000080)) modify_ldt$read(0x0, &(0x7f0000000180)=""/32, 0x20) write$vhci(r0, &(0x7f0000000040)=@HCI_SCODATA_PKT, 0x1) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f00000000c0)={0x4, 0x2}) 14:02:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x1c) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000080)={0x9ffff}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="66b9370a00000f32660f7def0f20e06635000004000f22e03ef2a40f01cb0df00f0f060f20c30f009200000f2298", 0x2e}], 0x1, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:02:12 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1cf20100", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:12 executing program 0: getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x800, 0x8200, 0x7fffffff, 0x78d59cb9, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x701, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)={r0, 0xb8, "4c14bfd5afec7bbf53d6f7d76393c9f0c89215d849d9fd387776dbeaa03a3df3d5d80d9b860366d3b951e755b4014a39dcd39662ddd81922e6b73ef97c2b220aff06c71cb859b0e47ba6c59ec6600be8415877a59293ac5e0100aefead3b32c051745017a384fcbd7a85c6aa15dfcee78eda428df7652ea2c837f21a4af1e59cdb8c35e32be3bd6fd0a2f17f655ebe67fe50e649afc5dca7c1e2a50a6aaaa579d262cf38766e8eb96cb91b759467de000000000000000000"}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r1, &(0x7f0000000200), 0x10) socket$unix(0x1, 0x1, 0x0) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 466.451807] IPVS: ftp: loaded support on port[0] = 21 14:02:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) 14:02:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2040, 0x20) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000140)) r1 = socket(0x2, 0x3, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r2 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) rt_sigpending(&(0x7f0000000100), 0x8) ftruncate(r2, 0x8007ffc) sendfile(r1, r2, 0x0, 0xffff) 14:02:13 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000200)=""/174) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x400) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2840, 0x0) 14:02:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000380)='\x7f\x00roup.controllers\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0xc, @rand_addr=0x6, 0x4e21, 0x1, 'sh\x00', 0x0, 0x800, 0x1}, 0x2c) r1 = semget(0x2, 0x3, 0x108) semctl$IPC_RMID(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') lseek(r2, 0x20400000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000001, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 14:02:13 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000180)={0x0, "c9fd84c59d8b5bf75235eb148cb13cbce4e91bde513c0cb3f9463d87f54499c3", 0x3, 0x9, 0x3, 0xc008c, 0x3, 0x4}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x103000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mime_type)vboxnet1,$trusted\xee,vmnet1keyring.posix_acl_access\x00', 0xffffffffffffff9c}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000003c0)={0x30, 0x5, 0x0, {0x0, 0x5, 0x0, 0x6}}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000000240)='./control\x00', 0x2) 14:02:13 executing program 2: syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="0001", 0x2, 0xfffffffffffffffd) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000140)={0x18, "af860bde7e8b86a48538107d9c7b794f53bee5d7d92c80882d504e8438745c9253d6b84221abfc8268a7b3598df76c3587f5e131b7044e87e88383a56c6d55cb6a25b889e42db2ac256116b27a482825fddca46ad57bdd61d8f5491bc3dd27858e212c9171d73178c62addad2954be1764ae3d2791ba8208f3e0780ec3d4f89f"}) keyctl$dh_compute(0x17, &(0x7f0000000040)={r0, r0, r1}, &(0x7f0000000440)=""/240, 0xf0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:02:13 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x2) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000000140)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff80000000, 0x4, &(0x7f0000000600)=[{&(0x7f00000000c0)="c86e640e3eef79f3d7ca7638f21f5900aad2e337f0308897", 0x18, 0xd734}, {&(0x7f0000000380)="ccbccb8b243cc1d5c33bd71c24d337c3bc253c647d1e44c1651f6c5cb0273c909d9e6c360dc36c05f597f896bb4f8030928316136b61b29a9b92dca336003daef539dec25d9d969f4841a4c410ac11108275e27b47cefdb629e4a5e3b8f3f221fa6bfc5629e381e51afac3a2b594d0d9a1e8196bc475b6bdacf7b23f85a098ba60ccc260217e72203a3366db570af85847fbe918c5d20519e2eb6ef3a33a06e5adf89e934ecb64c3622c527e32d15a31c5c00d7702fb32cf3a7068b33aa94e144752c5263ed9db99f8d40fbbbf054a76b667b93e35972b38d5aa", 0xda, 0x7}, {&(0x7f0000000480)="48b8168db75c5d24f4655744f05266218d5918e36e91be5932bb3b26b976aa538a182acb57a4a19b22e0ce59c3a62b8d4efacac802bb53130dac34b7fdaacfaba17f632614cb6008f8b29db5963b7ccb3a9d06bb90fa96c9884a", 0x5a, 0x8}, {&(0x7f0000000500)="4d4853cefcaf58213100917e7096f9d71e236d13072d1f1bd1bcf4a28f6eaff62bac304d3d26136607eff3dbd37af0e82f7db6ba33e9d9ab90da32cf5b166dbc58cd779aa29372f872c37795c842aac3217e1d36ca2d8bc59a2825fafe2c7ae8b1cb59f241c737c26871deaf8973d15797c291d0183b770be3099ce4d3bb9be7aa75a6dd018fc75d6126992ef05bc1290751701a1b185dbb2d9c336019eeb1520c163d0057b907c78c59388603b70d05f64ab6a1e1b1735b17e879c48a3c5281c6d620a63acbc2d693c6b88e0dd05accad794e08700aea05a0910f0a665b71cb245dd6f2db3de3eb3c4fe04b7d1d25", 0xef, 0x2}], 0x0, &(0x7f0000000780)={[{@rescan_uuid_tree='rescan_uuid_tree'}], [{@obj_type={'obj_type'}}, {@obj_role={'obj_role', 0x3d, '\\cpuset{{'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@uid_eq={'uid', 0x3d, r5}}, {@obj_role={'obj_role'}}]}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x8000) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[@ANYBLOB="aad4370b80a25d64f89a57a96aacdda62165d0d11cfbffffc0a613b633353aae989d6cbe74a3b4526feb5c9bad86799ca6c632e85028848929cf", @ANYRES16=r6, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 467.505825] kauditd_printk_skb: 255 callbacks suppressed [ 467.505833] audit: type=1400 audit(1556719334.021:971): avc: denied { map } for pid=16379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 467.565602] audit: type=1400 audit(1556719334.081:972): avc: denied { map } for pid=16379 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:14 executing program 0: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) read(r0, &(0x7f0000000180)=""/19, 0xfffffe47) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./bus\x00', 0x2, 0x0) splice(r2, 0x0, r3, 0x0, 0x100, 0x0) r4 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)="0d11fd0019b95ce1a0e58aab13d0f4d91223c93e997aaf4826b774356acf10fbb4c8dd9af4", 0x25, 0xffffffffffffffff) r5 = request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='ntrusted!posix_acl_accessuseruser\x00', 0xfffffffffffffffb) keyctl$unlink(0x9, r4, r5) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000300), 0x4) 14:02:14 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) setsockopt(r2, 0x81, 0x54ab, &(0x7f0000000180)="aeea07cebff331c325b9167ac768291dd8af80a44e9a652c50e5829060dc5ebad40aefb3a1052d906bfb58177f8ac838b739c5672772aa40f6a08e03e6ed9257381f7f7c4eb93b5921eeb818f24fc267d636a59b5b48ff8dc327eec291119d609595f537447b", 0x66) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x101040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 467.741229] audit: type=1400 audit(1556719334.101:973): avc: denied { map } for pid=16379 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 467.902883] audit: type=1804 audit(1556719334.111:974): pid=16366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir207038337/syzkaller.dvmK9O/367/file0" dev="sda1" ino=17367 res=1 14:02:14 executing program 4: syz_mount_image$minix(&(0x7f0000000240)='minix\x00', &(0x7f0000000280)='./file0\x00', 0x7fffffff, 0x1, &(0x7f00000003c0)=[{&(0x7f00000002c0)="d53d6c5a77d695dbb8e5e3703e15340a471adbd858a3dd1a0098b87fbf2ddba6c53fb263358291b23d98ee764025fb50e7450a4ce58467fd771090b532d9f4d963b2d765e89ae20c3916be447e73dfa989c2e6bd762033539039e2d564b30c2c3952f270434bf466437325b023520b83c1ac17a8771d09992d1405744eeef0b3cd39094b99dbab039e4cce20fb60666535cf3764816ad4c729cea2b1aac2187b47de21838f71c3e29816abcf34fe1c3f643ede658439dbd604fd532c5dfc7ea7a88f7dd7c8da26fa7bbde1c742cc80aa0dc2d20856a5dc1826f65d30a617e0342622a69e88cd7348", 0xe8, 0x2}], 0x1028, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @rose}, [@default, @default, @remote, @rose, @rose, @default, @rose]}, &(0x7f0000000000)=0x48) getsockopt$ax25_int(r0, 0x101, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x4) chdir(0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, {0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffffff}}, 0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x450000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e21, 0xa53, @mcast2, 0x1}, {0xa, 0x4e20, 0x1, @ipv4={[], [], @empty}, 0x100000000}, 0xfffffffffffffff9, [0x2, 0x3, 0xfffffffffffffffb, 0x4b, 0x5, 0x401, 0x7, 0x5]}, 0x5c) listen(r0, 0xfffffffffffffffd) [ 468.074557] audit: type=1800 audit(1556719334.111:975): pid=16371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17367 res=0 14:02:14 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) accept4(r0, 0x0, &(0x7f0000000000), 0x800) [ 468.328603] audit: type=1800 audit(1556719334.111:976): pid=16366 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.0" name="file0" dev="sda1" ino=17367 res=0 14:02:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40000, 0x0) [ 468.456680] audit: type=1400 audit(1556719334.121:977): avc: denied { map } for pid=16379 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:15 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x85) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 468.589654] audit: type=1400 audit(1556719334.181:978): avc: denied { map } for pid=16379 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 468.738375] audit: type=1400 audit(1556719334.201:979): avc: denied { map } for pid=16379 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:15 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x1fffe) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 14:02:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="380028114c807b48a3a82ab0484bafeb70ff1d916a1ba92373b3eee4980ed8c50da0055dc43476be6c58258a033c465abd5c8e12ee1d8d5e6ab008", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c0002000800040000000000"], 0x38}}, 0x0) readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/6, 0x6}, {&(0x7f0000000140)=""/184, 0xb8}, {&(0x7f0000000200)=""/135, 0x87}, {&(0x7f00000002c0)=""/190, 0xbe}, {&(0x7f0000000380)=""/96, 0x60}, {&(0x7f0000000400)=""/142, 0x8e}], 0x6) r1 = syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0x2, 0xa0440) r2 = syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0}, &(0x7f0000000700)=0x14) getsockname$packet(r0, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000600)) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000940)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000980)={0x0, @multicast1, @empty}, &(0x7f00000009c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000a00)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000a40)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000ac0)=0x14, 0x80000) accept$packet(0xffffffffffffff9c, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b40)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000b80)={@multicast2, @empty, 0x0}, &(0x7f0000000bc0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0}, &(0x7f0000000c40)=0x14, 0x80000) getsockname$packet(r0, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000e00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001200)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="78030000", @ANYRES16=r2, @ANYBLOB="00022cbd7000fddbdf250300000008000100", @ANYRES32=r3, @ANYBLOB="1002020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040011b8000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400b051000008000600", @ANYRES32=r5, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r6, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="4400020040000100240001007072690972697479000000000000000000010000000000000000000000000000080003000e00000008000400faffffff08000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="f800020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000900000008000600", @ANYRES32=r11, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400bf06000008000600", @ANYRES32=r14], 0x378}, 0x1, 0x0, 0x0, 0x4000}, 0x10) [ 468.954306] audit: type=1400 audit(1556719334.201:980): avc: denied { map } for pid=16379 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:15 executing program 2: r0 = socket(0x44000000002, 0x3, 0x67) r1 = getpgid(0xffffffffffffffff) prlimit64(r1, 0xc, &(0x7f0000000140)={0x0, 0x7ff}, &(0x7f0000000180)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) r2 = syz_open_dev$vivid(&(0x7f0000000380)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000600)) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000280)="0eebd1b4", 0x4}], 0x1}, 0x4008000) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000300)={&(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3}) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 14:02:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 469.495679] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32844 sclass=netlink_route_socket pig=16431 comm=syz-executor.4 14:02:16 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000040)=0x1) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) 14:02:16 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000400)={0x0, 0x2e4}, &(0x7f0000000100)=0x8) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000004c0)="fa53013826fe8c0bbc9371c3106116caf1229e7bd31bb7b53df7c3e4384d369d2961b097192d18cfac647c54ddd7d8b4057e68b1c413e09d92ba7667c73dc19578cdc6f0cd2c289d6c8155dae9aac7a5f56b16697eeb23da84411baaf4cc8c648f074e1664e889d68859be9ca9e79ae9e98522bc181bd7f3626ec97ca25a0ee21d93f267857ced293e676748e7df894492351681b855868ff997f9538eb0cd60d324c2596126840adaad1ce2b5b76a940364a34a2a3830f17a81c73970982f2ae33a9976653e54d57525256200e8ee6dde9d20d8b067808b1e7e15a2ed22070f6c49eb6fdb054d12e45abeb4c84586bb57219932af6ba55c8a4f17273b00067a") r1 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x4, 0x303200) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000340)=[0x3f1dbeb3, 0xffffffffffffffff, 0xffffffff80000001, 0x7, 0x1, 0x48e], 0x6, 0x6828, 0x2, 0x4, 0x9, 0x7, {0x7d91, 0x9, 0x4, 0x40d, 0xfff, 0x7fffffff, 0x2, 0x0, 0x80000001, 0xffffffff00000001, 0xff, 0x7ff, 0x4, 0x1ff, "df5607f988e7988133ecdd8551259e289330dc124d512971489deeca09b842c3"}}) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)=0x40000000000003) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x80000001}, 0x8) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000480)) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)=0x11) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000440)) ioctl$TIOCSTI(r2, 0x40186f40, 0x740300) 14:02:16 executing program 2: setreuid(0x0, 0xee00) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x99e24b65f9637f17, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1}}, 0x10) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 14:02:16 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 14:02:16 executing program 4: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = gettid() ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000080)=""/46) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/158) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7}, 0x7) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x13) 14:02:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setresuid(0x0, 0xee01, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socket$caif_stream(0x25, 0x1, 0x3) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000000c0)=0x2e, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x40000000004e20, 0x0, @loopback}, 0x1c) socket(0x2, 0x8080e, 0x0) 14:02:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{0x0, 0x0, &(0x7f00000029c0)=[{0x0}], 0x1}, 0x100}], 0x1, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x8242, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000100)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5264, 0x400100) finit_module(r1, &(0x7f0000000080)='/dev/media#\x00', 0x0) recvfrom$llc(r0, &(0x7f00000002c0)=""/186, 0xba, 0x0, &(0x7f00000001c0)={0x1a, 0x320, 0xfff, 0xfff, 0x0, 0x8, @random="7f563870e577"}, 0x10) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='cmdline\x00\f\xf4\x11\xd5\x04b\x18{\xb0\xf3\x17\\\n\xff\xf1\xc4\x0e\xed\xecW\aN\x9e\xd8m\xa8\x93\x92\x88\xd3\xf84\t\r\xb9V\x1d\xa4~_\xe4\xdf\xda\xebk\r\xef\x02\xc6:\x9d\xb2\xdf\xe8c\xddC\xe8H\xb3\xe7\x00\x00\xbf\xf2?\xb5\xc6&\xde\xd6g]\xacW\xe6\x04\x19\xad\xb0d\x12\xea\xe3N\xd0\xd2\x00\x00\x00\x00\x00\x00\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 14:02:17 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1000000081, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) setpgid(r4, r5) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r6 = syz_open_pts(0xffffffffffffff9c, 0x80) r7 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r6, 0x5602, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x7, 0x9, 0x9, 0x6, 0x1}, &(0x7f0000000300)=0x14) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r8, 0x84, 0x78, &(0x7f0000000380)=r9, 0xffffffffffffffbe) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$PPPIOCSFLAGS1(r8, 0x40047459, &(0x7f00000003c0)=0x2010000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r7, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) getsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f0000000400)={r9, 0x1}, &(0x7f0000000440)=0x8) 14:02:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) 14:02:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000440)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xd, 0x0, 0x70c000, 0x0, 0x2}}) 14:02:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x0, 0x0, 0x20d) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000001c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000200)=""/169, 0xa9}, {&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000380)=""/57, 0x39}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/81, 0x51}, {&(0x7f0000000440)=""/142, 0x8e}, {&(0x7f0000000500)=""/222, 0xde}, {&(0x7f0000000600)=""/130, 0x82}, {&(0x7f00000006c0)=""/34, 0x22}], 0x9, 0x80000000000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000180)={0x7, 0x2, 0x2, 0x3, 0x401, 0x4, 0x8}) 14:02:17 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1ff, 0x3c200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x40, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x100000000, 0x8}, 0x0, 0x0, &(0x7f00000000c0)={0x100, 0x101, 0xfa1d, 0x8001}, &(0x7f0000000100)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x81}}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, 0xfffffffffffffffe, 0x3e56b4e006374ad7) 14:02:17 executing program 5: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x1000, @mcast2, 0x6}}, 0x24) openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x3, @loopback, 0x40000}, 0x100000145) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f0000000180)) r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/pid_for_children\x00') mknodat(r5, &(0x7f00000001c0)='./file0\x00', 0x800, 0x80000000) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0054221ff2eca10000", @ANYRES16=r7, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:17 executing program 4: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r2 = getpgrp(0x0) getpgrp(r2) exit(0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e20, @multicast2}}}, 0x84) r4 = syz_open_procfs(0x0, &(0x7f0000000480)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)\x01\x00\x00\x00\x00\x00\x00\x00\x00\xfd~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xc0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11\xc0\x0fVEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G/S\xda\x99\xdb\xeb\xa0\xc9j\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\xff\xff\xff\xff\xff\xff\xff\xf9\xbb\xef9C\xcb(\x9f5$\xb2#\xf3\xb5\xfa@LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX') read(r4, 0x0, 0x0) 14:02:18 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'hsr0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x1000, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="67ac76bb7b66f16820089622ab9398bac16de178882c9d855340c7e670e6", 0x1e, 0x57115950}, {&(0x7f0000000100)="4725657e57900a02b05df55846a96730cf6357d45913cd56bb48ca16a08939a3ea755fec6517e8cc7045aa1e6a996928287b4368c1b081088660facfaa507b6fcef0e1e16e8af0a7c99d064832ed", 0x4e, 0xba4}], 0x10020, &(0x7f0000000300)={[{@nolazytime='nolazytime'}, {@grpjquota={'grpjquota', 0x3d, 'hsr0\x00'}}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@subj_type={'subj_type', 0x3d, '^bdevself'}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_gt={'euid>', r2}}]}) socket$packet(0x11, 0x3, 0x300) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4000000000003}, 0x4) 14:02:18 executing program 4: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x2080) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x4f07, 0x3, 0x8, 'queue1\x00', 0x510}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x10000, 0x7}, {0x6}], r2}, 0x18, 0x3) getgid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) sendmsg$kcm(r0, &(0x7f0000000b00)={&(0x7f00000007c0)=@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev}}, 0x80, 0x0}, 0x0) 14:02:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) 14:02:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xb, 0x4000) r2 = mmap$binder(&(0x7f0000c5e000/0x3000)=nil, 0x3000, 0x1, 0x2030, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)={r2}) 14:02:19 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000)=0x2ecb, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x160) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x414100, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000080)=0x8, 0x4) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) sendto$isdn(r1, &(0x7f00000000c0)={0x400, 0x1, "c48d13a6570448a77420a3acc576f1736d396ac19d69d43ae7d1f5f26d659572f178955cbbd63055ca9c3f90eb2eb3569217d195e45aeca733a38e67c478374c84cb7a7c4d36144c44e37a61cf8d748e485b7f5b22e50c86eb6e5574a118964dd837c4fcfd71f8a2d2fa7f73040a02a7f89fe3d805cf0006740df9668953e996333a4994a793c68954f855d6ae746ddc80b6888e1d7b316bbaf9bdb48743cc39f28cbabd61085a50ec980e1ae90cf9befebcb1d875d49209c389679f05b0e3cd"}, 0xc8, 0x0, &(0x7f00000001c0)={0x22, 0x8, 0xff, 0x9, 0x100000001}, 0x6) 14:02:19 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x200000c, 0x113, r0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 472.590888] kauditd_printk_skb: 186 callbacks suppressed [ 472.590896] audit: type=1400 audit(1556719339.101:1167): avc: denied { create } for pid=16497 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:19 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) signalfd4(r3, &(0x7f0000000040)={0x9}, 0x8, 0x80000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20e000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 472.805269] audit: type=1400 audit(1556719339.101:1168): avc: denied { write } for pid=16497 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 472.963759] audit: type=1400 audit(1556719339.251:1169): avc: denied { map } for pid=16525 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 472.986145] protocol 88fb is buggy, dev hsr_slave_0 [ 472.986194] protocol 88fb is buggy, dev hsr_slave_1 [ 472.986270] protocol 88fb is buggy, dev hsr_slave_0 [ 472.986308] protocol 88fb is buggy, dev hsr_slave_1 14:02:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x84, 0x800000ec2, 0x4000000000002}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x29) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x1, [], 0x0, r0}, 0x3c) [ 473.071199] protocol 88fb is buggy, dev hsr_slave_0 [ 473.076331] protocol 88fb is buggy, dev hsr_slave_1 14:02:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f1234123f319bd070") syz_execute_func(&(0x7f00000001c0)="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") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_validatetrans(r1, &(0x7f0000000080)={'system_u:object_r:apt_var_log_t:s0', 0x20, 'system_u:object_r:framebuf_device_t:s0', 0x20, 0x28, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x84) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 473.223097] audit: type=1400 audit(1556719339.271:1170): avc: denied { map } for pid=16525 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 473.301138] protocol 88fb is buggy, dev hsr_slave_0 [ 473.306307] protocol 88fb is buggy, dev hsr_slave_1 [ 473.437188] audit: type=1400 audit(1556719339.301:1171): avc: denied { map } for pid=16525 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 473.472163] protocol 88fb is buggy, dev hsr_slave_0 [ 473.478029] protocol 88fb is buggy, dev hsr_slave_1 14:02:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) [ 473.634563] audit: type=1400 audit(1556719339.311:1172): avc: denied { map } for pid=16525 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:20 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) fchmod(r0, 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 473.791423] audit: type=1400 audit(1556719339.361:1173): avc: denied { map } for pid=16525 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:20 executing program 4: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)=0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007740)=[{{0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x93519dd6504863d7}, 0xc99}], 0x0, 0x0) [ 473.950469] audit: type=1400 audit(1556719339.411:1174): avc: denied { map } for pid=16525 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 474.073595] audit: type=1400 audit(1556719339.431:1175): avc: denied { map } for pid=16525 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 474.150486] audit: type=1400 audit(1556719339.481:1176): avc: denied { map } for pid=16529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="020000000100070000000000040002000000000008000200", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000500", @ANYRES32=r3, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="e8ff0100e5c93ea81e393588a19de429b352ff1f3ce9ab2cff4169344656995ac4d2ff2ff0284a7dddd077078999513251bb0dbea016479c76a57a8b978c033921307141170faee226f35108d28b8249dc51fb7e17baefc75c5705cfe06dd5d902348342b167fd31d2032add46fb61b1fb1c339f1e65076f4dfb7d20e6d3fb32a8da0da4f7", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="10000400000000002000000000000000"], 0x5c, 0x2) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000080)=0x8, 0x4) fanotify_init(0x1, 0x759357201ab60291) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) 14:02:21 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000100)={{&(0x7f000090a000/0x4000)=nil, 0x4000}, 0x1}) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000000c0)={0x8, 0x1800000, 0xec8}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f000090a000/0x2000)=nil, 0x2000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f000090a000/0x4000)=nil, 0x4000}}) 14:02:21 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x3, 0x3, 0x6, 0x3, 0x9, 0x7fff, 0x101}, 0xc) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x49, "326fcf41475a4cba327774ba0b74e3ffefdd5c28c16fcd9a6070654f0d2c45f5dc9e9debf33d3a3a0736f90cdc96119f7bafcb4ffa4bad362028b18e6cc4e9ba50b2afaa661e215965"}, &(0x7f0000000040)=0x51) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r4, 0x4, 0x7, 0x1f, 0x7, 0x9}, 0x14) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="000329bd7000080000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, &(0x7f0000001080)) 14:02:21 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:21 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = syz_open_pts(0xffffffffffffff9c, 0x80) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r4, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='posix_acl_access\x00') syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:21 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000380)={0x7b}) 14:02:22 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x5) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="6be3c968a8641fbf8a4b8d86c3f2e010000000", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f00000002c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0xad2, @empty, 0xfffffffffffffffc}, 0x1c) 14:02:22 executing program 2: r0 = socket(0xb, 0x5, 0x1000000000000) getsockopt(r0, 0x5, 0x1, &(0x7f0000000000)=""/76, &(0x7f00000000c0)=0x4c) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000080)={0x0, 0x7530}, 0x10) recvfrom$inet(r0, &(0x7f0000000100)=""/124, 0x7c, 0x40, &(0x7f0000000180)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000014c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000001380)=0xf5) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000013c0)={r1, 0x80000000, 0x20}, &(0x7f0000001400)=0xc) read(r0, &(0x7f000083b000)=""/1, 0x1) r2 = syz_open_dev$audion(&(0x7f0000001440)='/dev/audio#\x00', 0x1, 0x480200) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000001480)={0x81, 0x7, 0x4, 0x9, 0xffffffffffffff01, "2b9e6d8a651e0ec1a7ffb981067003b2f674b9", 0x9, 0x4}) pwritev(r0, &(0x7f0000001240)=[{&(0x7f00000001c0)="b7c27c950b43e12259bf446142e9a92d2fdbd78813df0f571e95f8963344fdea", 0x20}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="29c2cc6496f5a3adfbae073a92a5a4", 0xf}], 0x3, 0x0) 14:02:22 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@errors_remount='errors=\"emount-ro'}]}) 14:02:22 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0fbb0e7eaa"], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x23b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000100)={0x5, 0x0, [{0x0, 0x4, 0x2, 0x4, 0x0, 0x1, 0x7fffffff}, {0x80000001, 0x100000001, 0x4, 0x1, 0x1, 0x7fffffff, 0x8}, {0x4000000f, 0x6, 0x4, 0xffffffff, 0x6, 0x9, 0x1}, {0x80000008, 0xfffffffffffffbff, 0x1, 0x3, 0x3, 0x5970, 0x7}, {0x8000000f, 0x400, 0x6, 0x6b, 0x20, 0x1ff, 0x3}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:02:23 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100fff, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(0xffffffffffffffff) close(0xffffffffffffffff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 476.901314] IPVS: ftp: loaded support on port[0] = 21 14:02:23 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='bridge_slave_1\x00'}) setsockopt$rose(r2, 0x104, 0x7, &(0x7f0000000000)=0x3b, 0x4) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) fsync(r3) 14:02:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) 14:02:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa22ffffffffffff86dd60b409000030000000000000000000000000ffffe00000023e020000000000000000000000000001830090780009040060b680fa00000000000000000000000000000600000000000000000000430000000000ffffac14ffbb"], 0x0) 14:02:23 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x1, 0x101100) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x81, 0x80) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000001c0)=0x3ff, 0x1c1) clone(0x200100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x143) getitimer(0x4, &(0x7f0000000180)) 14:02:23 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:24 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040), 0x2) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f7000000041356406d93a52fdfbdaeb6bf16416aaeb63141b59ff50dc08261c127028e2939102005fcf99c5e8145de02278fc1bb1a7f2d3584896e7c812afe6f964654fa4a57455cd03d0a89b12f3ebbe51a848f3a51f7bffb25c8821a56e9879e8e28d4c073b49ac68b8d46fcc09e24cd6ab3c6dc9d49558ab62db00891f1c6e8ef355dd13d55ca09538111331dd6611f9eddc6fc0ce34") writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000200)="480000001400190d09004bd4e40d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x240002, 0x0) [ 477.773745] kauditd_printk_skb: 144 callbacks suppressed [ 477.773754] audit: type=1400 audit(1556719344.281:1321): avc: denied { create } for pid=16629 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000080), 0xe) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x400000000000072, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x80000001, 0x1000, 0x0, 0x7, 0x5, 0x0, 0x2, 0xd7, r2}, &(0x7f0000000180)=0x20) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0x7, &(0x7f0000000100), 0x5) [ 477.914533] audit: type=1400 audit(1556719344.291:1322): avc: denied { write } for pid=16629 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 478.098212] audit: type=1400 audit(1556719344.341:1323): avc: denied { map } for pid=16637 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000080)={0x3, 0x101, 0x2, 0x4, 0x10}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendmsg$alg(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x200, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000100)=0xc, 0x4) dup3(r3, r4, 0x0) [ 478.207603] audit: type=1400 audit(1556719344.351:1324): avc: denied { map } for pid=16637 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 478.344443] audit: type=1400 audit(1556719344.381:1325): avc: denied { map } for pid=16637 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:24 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000380)={0x47, "8fc2bb913d21791132cedaa12b8b74865ea832a44e4bdf95af9b76a13edbd41179264aaf09e02394f23c9665be46b3ae7632c0c87ce43865c19ba1b8a125ed16151ae91025c744067d7bbc099f6748d141c6bb0244521c49beff10fe34c4ffc23f40e6277d3c2767737cc5f647afa434d588959b19a77e6936147e98087fed3d"}) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f0000000000)=0xf2c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="00000400", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 478.525207] audit: type=1400 audit(1556719344.381:1326): avc: denied { map } for pid=16637 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:25 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000040)='bridge_slave_1\x00'}) setsockopt$rose(r2, 0x104, 0x7, &(0x7f0000000000)=0x3b, 0x4) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) fsync(r3) [ 478.648620] audit: type=1400 audit(1556719344.441:1327): avc: denied { map } for pid=16637 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 478.721777] audit: type=1400 audit(1556719344.491:1328): avc: denied { map } for pid=16637 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) 14:02:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) socket$key(0xf, 0x3, 0x2) unshare(0x60000000) [ 478.871508] audit: type=1400 audit(1556719344.491:1329): avc: denied { map } for pid=16641 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 479.050091] audit: type=1400 audit(1556719344.501:1330): avc: denied { map } for pid=16637 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:25 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000005c0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="62bc8570b6fa04", 0x7, 0x4}, {&(0x7f0000000380)="2384798555a7c877241f4d5d84fda1c7178c162f63ff5baadb07ec7febd2a5283da302be7712e73fcd46d5decf4f464e012f9c103c52f261c37ca90776704a3e0893cf87ae4d8c066f7dc2b390f63e4323", 0x51, 0x800}, {&(0x7f0000000300)="a1512981cc343d8d777c56458265ec642186932f08a447843f42445cff8b59b6bdda5f0f5f80a9c9ba35091a81a371c8a015b1009cedbc81f548d5067f57", 0x3e, 0x7}, {&(0x7f0000000400)="530daae4fe37a46d1705335f676665baf7fb10", 0x13, 0x6}], 0x1020000, &(0x7f0000000600)={[{@nls={'nls', 0x3d, 'cp855'}}, {@barrier='barrier'}, {@barrier='barrier'}], [{@uid_lt={'uid<', r5}}, {@subj_user={'subj_user'}}, {@dont_hash='dont_hash'}, {@fsname={'fsname', 0x3d, '/proc/self/net/pfkey\x00'}}]}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[], 0x3c7}}, 0x0) 14:02:26 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x101002, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x3, r6}) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="826518c93fc3b549e00708903bf5c1de966fb5cb9b10340c9229ef81cb846cfdc314b9c4047c2451ddcdcb2c6cab70c93413fde48aca8d5a423b2adcc0e422df249a469dc89a43d9d9992b666afb3d2a85b4730ca0561b82ee3b5b41502bdec3656718332ec852214eea4e2862f382fea7ca79c5d4eaadb3da570ae076ae781148a8d669", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:27 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) 14:02:27 executing program 2: prctl$PR_MCE_KILL(0x35, 0x1, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff}) prctl$PR_SET_FP_MODE(0x2d, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) 14:02:27 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffff9c, 0x80) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0xa0801, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r3, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x2, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x0) 14:02:27 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="001328657000000000000d000000080006b5b60d66dc7fe33f8200e10b0000810860dbc523929c10c5cbcd94d365e05ab9bfd580deaa03d2dd91b263c3c5ed388234485fb9"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:27 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='pipefs\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000200)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 14:02:27 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x7, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={r2, 0x7f}) 14:02:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) 14:02:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) 14:02:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) 14:02:28 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x4b02) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:28 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:28 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x81, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/vfio/vfio\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) io_setup(0x44, &(0x7f0000000040)=0x0) io_submit(r2, 0x2, &(0x7f00000003c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x7, r0, &(0x7f0000000180)="cdea39df1d54d817ffe49062941a72344d84709c1cb4a96b9a", 0x19, 0x7fffffff, 0x0, 0x2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0xd7ee, r1, &(0x7f0000000300)="658f1a08f225b602f47625ac70397b8c9ca362e9ab353ad17f4d0e6b8fe1a878b9e7836ccb01ffddd1013f5615", 0x2d, 0xff, 0x0, 0x1, r0}]) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = syz_open_pts(0xffffffffffffff9c, 0x80) r6 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r5, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r4) close(r4) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) 14:02:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, [@map={0x18, 0xf}, @call={0x85, 0x0, 0x0, 0x22}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @exit, @exit, @call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x5c, &(0x7f00000000c0)=""/92, 0x41100, 0x0, [], 0x0, 0x65a2c2429100826c, 0xffffffffffffff9c, 0x8, &(0x7f0000000140)={0x8, 0x5a29ac88}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x7f, 0x3, 0x8}, 0x10}, 0x70) r1 = signalfd(r0, &(0x7f0000000240), 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='setgroups\x00') ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f00000002c0)={0x0, @frame_sync}) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000380)) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x1, 0x4, 0x4, {0xa, 0x4e22, 0x0, @mcast2, 0xb0}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000440)="cf2ca3a4", 0x4}, {&(0x7f0000000480)="73f2a0c7c74351ea02d373707b59a2", 0xf}, {&(0x7f00000004c0)='g', 0x1}, {&(0x7f0000000500)="1a5221fe0e5d34e10e303cf3a9d6bb7e2cea514fb4de75bb82f507c53132f7308d6eccd9f41f7e2fc7406bd5d251f0feb0165547acf73a9336564b4f6d288b42c3cfdd55b7ec6e757adb55118b148099315b0bcd643ed811719be8365a97a4942919c4afd44b125b40700f3b9f4c203b95060b28d078d70d3c2c6e78288cc8160d24551668e7f9c1da2d33a29a7dbaf6609b4cf5d80c28c60d7df6a881e383a9fa37a10639f43c2817affd44ae7cda26c1860c00d1ed5e720f15ee2894a45219", 0xc0}, {&(0x7f00000005c0)="68d8c2a3f8afc0fa9971321889eab1a48772258c5658b82a9c42477c4b47b684535248a1102b4693ff88ebfe2491b9b7598b6f88b9919d6c547a5e6dcf28394d", 0x40}], 0x5, &(0x7f0000000680)=[{0x60, 0x103, 0x80000000000000, "dd154b0021fd2973726fb456bce4358562ea6f5ed08eaefd3e1be71a32e2534dfe224af3fb71669194b286968fbd8a00539b52620bd1f80340f9accd6e145fd941fb16c8b9af6aaaadb1cf"}, {0x88, 0x10e, 0x1, "ac350bc4bf8e715ecc65766dd90be4de2a83ea1ad26390fd7d46f78ae3d01dcc538c207d38a7b969d0db332af2103677871d18b203a5177f153b4276c5adc669bfd474f364f029f1bbf491c1706b5937f023fd54729b91feeb70a80923b4ccd14837fdbe58a25fb1dc5d70515fd10efd2da22cfe05200e"}, {0x80, 0x6, 0xf33, "3f28f0b752c5b49972987a476781ad798ed34253b95b9e4e996b2db7e54463b942416fb2547ecdacebb5e77ce6c42026db490f8f0ab6ec871f4eecc62d5114a4c4f0138d237a40bd55616b099d0fb86f28245afb4ae873e7237aa1c6d5040ae559325b79c9e779c05e74c3"}, {0xf8, 0x11f, 0x8000, "9e2ff8d6eaec5e54836c4e1d57f73795fd0109f9a13dd1f6f286a1ec3a325062f98a13a66aeebfec23548fad939c3e37db0ab103aad86fea6133fc2c9fb888e1df7eacf162722a3e1825b1b070460fdb0486d8da5abcab4efc95be1bd4b84195bc7db578613238f3bebbcc94f27cd1d99b8cda0d75a575e6e46b76bf01b386ba47cad0d75ad6cf9983da04339bbd58745b8c797ddcbf14c10b73604dfc559fac8db7707f31aabe3d501d7a7be2ab4e6a588c2af55951e1d7e5c1ccfb100e14c4788a7495851abf4d7c2819f467900f9273791d850a3e41073790d96b31c410a8a90d1ac8554b6fb1"}, {0xb8, 0x3a, 0xfffffffffffff185, "7639d391c948f120c6e2c152c87940dda0e0f37380e07f390c1373339e50f5005e5ece08d9293253dd5a22055cd297a89f7cecdd0db88440883172acec85850dfc837172b9e34c3894efd98a3d1682fcae1869972fa1108c79f983f8a7385b5b0d20db0d0992579852669c297b320de61e7c3abf5a61239241924c7a9aa739627b059c83bb39138b7d60a1f668e0662df2de1d9f4d3b51f22ba597f1be51edf00d"}, {0x98, 0x3a, 0x5, "063bc44b4ef2cf2405ebfd2f55debec60b06c4a8947c861c59ce4e08eb23ebce03372ad461f217a98436979e296b626ee5d375b717c28320e05b4f278a5703df7344e4d8e6f1496631be8a558d04a35c8bef118fc742e31fb105cab3be293a966f65ce6ee320e4b8a986e547169d0c7cc93e398d9a66b9eaf0837d36cc07585a003a61"}, {0x68, 0x29, 0x8, "69efa83ec62ba26b8b07d1c3d6e828f52c6c6302d23982f18f6b662edfeb3ca15d0c9608b3f037421c28f618530b04166246ea6198b2f17e2347b961a3475c27ea4fd0e8639e3274d34bb8146fc060479b56e2a3"}], 0x418}, 0x3}], 0x1, 0x8000) writev(r1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="a76b8b3e9ddd3f509b7adb0a7a0d85169db0b4601a4bf29a62b2608685ec878d139fa50b9e1d209aa918030d20538288bb3c09c6b579db159be3fb67f4c56a8f1238490768fe8ef0ac569fdcf21db5b0a34d12ee911ca3bb5f82c248b0783affbd61b4a6050a72a51fd752e3a450ea425f91c072002170ce8045956977a5effb90c3c83502bb9d6a53e05824b2d0f454b3ce12b5260667189c719d5d17eace7a57e7f9a3dccc8602359785", 0xab}], 0x1) prctl$PR_SET_MM(0x23, 0xf, &(0x7f0000ff9000/0x4000)=nil) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000c00)) set_tid_address(&(0x7f0000000c40)) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000c80)=""/31) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000cc0)=0x2, &(0x7f0000000d00)=0x4) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000e00)={0x0, 0xc0, &(0x7f0000000d40)="70ca1d73c7a5f27c79e58724875450785b134e0eab93dbe2d55fa160a0a43f78c22a67395707756ef2ac065504fd052d4ef90cc180f659fc2cb94bb2ec221502bf2186c487d8dd7bfccdaa45a06cce1d30f49f85cc52fd964eaf6e78c796bbd27078663ce5859edc2bfe48cb82890e7402913e1fc805cda5aaa0f8d4cbb7b4fe4a0b5484ca0bf56fd474b610aab056aeeaf30e468e5aefbed76b6980387add1acff1b6e0df86f234097c4cba9398a36a0ccb9196d50661b63f26c9a13c8a2fb2"}) ioctl$TIOCSIG(r2, 0x40045436, 0x23) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000e80)={&(0x7f0000000e40)=[0x2, 0xffffffff, 0x5, 0x1, 0x2], 0x5, 0x5, 0x7ff, 0x4, 0x0, 0x2, {0x3ff, 0x9c, 0x200, 0x5, 0xd9, 0x0, 0x5, 0x5, 0x6, 0x2, 0x42e19507, 0x3, 0x1000000, 0x8, "8ce82c435c5e431cc1edf44310ff1b5f382d0241633dfbb7031925d63a560709"}}) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000f00)={0x58}) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000f40)=""/136) r3 = dup3(r1, r1, 0x80000) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000003280), &(0x7f00000032c0)=0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000003300)='/dev/ion\x00', 0x80000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000003540)={&(0x7f0000003340), 0xc, &(0x7f0000003500)={&(0x7f00000033c0)={0x140, r4, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x428d85a2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5c4569a8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x19640000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x27dc}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbc7b}]}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xacc6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x140}}, 0x1) prctl$PR_GET_FPEXC(0xb, &(0x7f0000003580)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003700)={r3, &(0x7f00000035c0)="87209ebb51f1d023b993996a0e09b625cd734cf8692055f8e7f93414b1932590c190d302021642fe1814f4b2900b41c55130454a532ec349272db563156b9c6774dcc87f930bb4e8a671a892c972fba9ad5d4cdbed1c74ccc3e4c674b071afa421fd1014f6122758d904ccb34355b5e889b88b7e8ca8e742f91b5f6fc40031227388c2c2e3222d173d2de6843dd271e7e5b97535e3066e0c0f8aee618f51d4e05b4bdbd9e55372e435e2e10387ba1e09191cda4e13aa71d6e160e6f79b968c78dae4f2be59646020cb9756628e9565bd29398fc00550858ea8ac234b687b5acf00db9a49789c3565b27620bc", &(0x7f00000036c0)}, 0x18) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000003740)={0x6, 0x7, [{0x9, 0x0, 0x8}, {0x933, 0x0, 0x7ff}, {0x6df7}, {0x2, 0x0, 0x101}, {0xffffffff, 0x0, 0x4}, {0x0, 0x0, 0x8}]}) write$P9_RATTACH(r2, &(0x7f00000037c0)={0x14, 0x69, 0x3, {0x81, 0x0, 0x7}}, 0x14) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000003800)={0x8, "8b1e71bbf6bfd1935267bf6431ce2f12247dd61f1927bd7f1b1c4a4fca914137", 0x2, 0x77c7e2a1, 0x7ff, 0x100, 0xe}) getsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000003880), &(0x7f00000038c0)=0x4) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000003900)=r0) 14:02:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) ioctl$VT_ACTIVATE(r0, 0x80045439, 0x70c000) r2 = getpgid(0x0) sched_getattr(r2, &(0x7f00000000c0), 0x30, 0x0) [ 482.785837] kauditd_printk_skb: 177 callbacks suppressed [ 482.785847] audit: type=1400 audit(1556719349.301:1508): avc: denied { write } for pid=16747 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 482.923877] audit: type=1400 audit(1556719349.311:1509): avc: denied { map } for pid=16760 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:29 executing program 0: r0 = socket(0x10, 0x3, 0x4) write(r0, &(0x7f0000000380)="26000000130047f1eb14c1f8000022ff001000e363000000010000000000000006000300054b", 0x26) fdatasync(r0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) 14:02:29 executing program 2: prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x10000) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x9, 0x3, 0x1, r1}) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000080)=0x5) getresuid(&(0x7f00000003c0), 0xfffffffffffffffe, 0x0) [ 483.061469] audit: type=1400 audit(1556719349.321:1510): avc: denied { map } for pid=16760 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) [ 483.150371] audit: type=1400 audit(1556719349.331:1511): avc: denied { write } for pid=16764 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 483.186977] audit: type=1400 audit(1556719349.341:1513): avc: denied { map } for pid=16768 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0x6a69619d) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) [ 483.238957] audit: type=1400 audit(1556719349.341:1512): avc: denied { map } for pid=16760 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:29 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 483.334929] audit: type=1400 audit(1556719349.351:1514): avc: denied { map } for pid=16760 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:29 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x200801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x8000048b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)=0x6) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0xffffffffffffff1b, 0x12, 0x100000000004002, {0x5}}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) dup2(r0, r1) r2 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="21055938ad15812606bc1a26352c0c24139bd5906633e2b8968f945f227a4a1d18ba2b1eb4d284df159beeb3c2613427e30a684706e23274ae733855", 0x3c, 0xfffffffffffffffb) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) keyctl$get_persistent(0x16, 0x0, r2) 14:02:30 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x80, 0x0) r1 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x4000) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000a80)=ANY=[@ANYBLOB="73797a30f02fcf52c83e4845a03397119e2a3471b38d78aa4f3d8e78d86188f243ca46f11decc1179bfa0ade9d7f9e81fe449d5864ad5b1cca104e1f4f375857a83ae2e3dde3a222774497f7e0c2031e1a5d6eadd7c79203241ce32188e8480500000000000000b289d8949dde5fb6c7945ae65549445fd768cb4abf1085b6af7c81c494fc841e75f18627d00e0cd019b948af3f36ea0a1e7ec1259be8542320ad209f8d4f1fe7f162a2535f47bded62d7d93fdc999ec4773380dd80d43314d3a9b0435a45eb6b3e700ada6bf9596cf0995f78a471304c8005e8658ce9f58d53"], 0xe0) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000200)=@v1={0x2, "a70f867d94f3"}, 0x7, 0x0) fcntl$lock(r2, 0x6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000500)={0xed, ""/237}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x40000, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000001c0), &(0x7f0000000240)=0x8) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000080)={0xe18, 0x101, 0x3ff, 0x200}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r4, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000900000003000000f80300000000000050010000500100000000000000000000900300009003000090030000900300009003000000001800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b80020010000000000000000000000000000000000000000000000002000736f636b657400000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020200060008000000030000000000000000000000000000000000000073797a300000000000000000000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000018024002000000000000000000000000000000000000000000000000280074746c00000000000000000000000000000000000000000000000000000000060000000000005801686173686c696d6974000000000000000000000000000000000000000003627269646765300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000b1fe8fc1ffffffff20000000010000001a00000000000000060000007df2ffffb81800000000000003000000000000002800434c415353494659000000000000000000000000000000000000000000008c01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0xaaaace4, &(0x7f0000000340), 0x800, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000140)={0x7, 0x33, 0x2}, 0x7) [ 483.489900] audit: type=1400 audit(1556719349.351:1515): avc: denied { read } for pid=16764 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 483.608162] audit: type=1400 audit(1556719349.351:1516): avc: denied { map } for pid=16768 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) [ 483.764595] audit: type=1400 audit(1556719349.361:1517): avc: denied { map } for pid=16768 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:30 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:30 executing program 1: socket$alg(0x26, 0x5, 0x0) msgget$private(0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r0 = socket$inet6(0xa, 0x40000080806, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0xa) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x4000000020000000) r1 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:02:30 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x100) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f00000001c0)={0x0, 0x401, 0x100000004, 0x85, &(0x7f0000ffc000/0x4000)=nil, 0x3}) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") open_by_handle_at(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x881) ioctl$sock_ax25_SIOCDELRT(r0, 0x89e8, 0x0) 14:02:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x8004510b, 0x0) 14:02:30 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x3, 0x80441) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r0, &(0x7f0000000180)="049c949b636f9f0c8fe03ffbb421c49060ff04115d8d0b2bad0eb089ad08d1fd3c0516fee677dae9fbae1d9b52a74fa55147b6ce379e9afb8b395040a057697fd1d2920efce7f63bf3c1b43e1f5b1e3eadd17e4b767f17a321550c206b9cb172b2627a5f250500924478156106f0ced13e", &(0x7f0000000200)=""/88}, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000380)="0adc1f123c12a41d88b070") r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$bt_hci(r3, 0x65, 0x4, &(0x7f0000cbc000)=""/244, &(0x7f0000000040)=0xf4) syz_execute_func(&(0x7f0000000000)="a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd300f7dcdcbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b0000006464660f382bd7670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9fbc462dd3fe566474f383ac4217f12c5a232efecefec") syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x40, 0x1) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000000)) 14:02:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:31 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:31 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @empty, 'syz_tun\x00'}}, 0x1e) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) syz_emit_ethernet(0x14, &(0x7f0000000080)={@remote, @empty=[0x0, 0x0, 0x0, 0xd00], [], {@generic={0x8864, "42a703000000"}}}, 0x0) 14:02:31 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x2, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 14:02:31 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000080)) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="31000000130009006900000000000010ab008048130000004600010700000014080003c03a250000000001f50000000000", 0x31}], 0x1) 14:02:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:31 executing program 2: r0 = socket$inet(0x10, 0xe, 0x80000001) r1 = dup(r0) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f00000000c0)={0xc00000000000, 0x1, 0x1}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa00809}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x24}, 0x1c}}, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000240)={0x7, 0x4b, 0x2}, 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f00000012c0)='/dev/input/mice\x00', 0x0, 0x111000) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000001280)={0x1, 0x5, 0x5, 0x0, 0xa87, 0x6}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000000), 0x176, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="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", 0x1000) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) 14:02:32 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x107, 0x7, 0x0, 0x108) 14:02:32 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:32 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x4000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/userio\x00', 0x0, 0x0) r4 = gettid() read(r3, &(0x7f00000003c0)=""/121, 0x400007f9) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80, 0x2) getsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) sendto$isdn(r5, &(0x7f0000000240)={0x401, 0x7, "cf40e1a73ec649b57930a1a200943c6ea43a3e9f7a7b8ec6a55e52cf37cfda214da5944c009fa313871ca274c96c91568edb7cb634cde50245ab845375e24362fda9c659f21ca3c7c967b48872f868ac9af81e5abc95b793c56c4a3f69d24b30d3e9c06cec23a13ed4d5784f0c3be6"}, 0x77, 0xc5, &(0x7f00000002c0)={0x22, 0xa87c, 0x9, 0x1, 0x2}, 0x6) getsockopt$inet6_dccp_int(r3, 0x21, 0xf, &(0x7f0000000100), &(0x7f0000000140)=0x4) tkill(r4, 0x1000000000015) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 14:02:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:32 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000580)='./file0\x00') syz_execute_func(&(0x7f0000000080)="656425a74a2ae92ca842980f05bf000c4000c4a37bf0c50141e2e922ebaabb3c00ba00000fc7a4ea70db000000000f383a9e020000002e420ff841169a8f698099005ba265aa104b26660f38091e2fdee5bebec421045f46eec421dd584243c4e10bf8d426d8f045f6196cef620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff3a0065f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53ffd2c4c40f9f3c6436b2aa42664d0f31c46500000ff7d29978c104c441c05983f9070bb3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") write$P9_RREADDIR(r0, &(0x7f0000000280)={0x52, 0x29, 0x1, {0x7fffffff, [{{0x0, 0x2, 0x2}, 0x8000, 0x2, 0x7, './file0'}, {{0x18, 0x3, 0x1}, 0x83f, 0x7ff, 0x10, './file0/../file0'}]}}, 0x52) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x1, 0x0) setsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000000)=0x7, 0x4) 14:02:32 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000000)={0x1, [0x6]}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x2f, 0x2a27, 0x1000, 0x101}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:32 executing program 0: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) 14:02:32 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffff, 0xe3, 0x0, 0x800, 0x0, 0x5, 0x400, 0xa, 0x7, 0x4, 0xe8, 0x7, 0x1, 0xf7e, 0x800, 0x0, 0x2, 0x9, 0x3, 0x3, 0x6, 0x5, 0x4, 0x400, 0x10000, 0x7, 0xffffffffffffffff, 0x4, 0x0, 0x80000001, 0x4, 0x5, 0x8, 0x1ff, 0x8001, 0x2, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x900, 0x2, 0x8, 0x9, 0x100000000, 0x5, 0x7}, 0xffffffffffffffff, 0x7, r2, 0x1) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:32 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:33 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffc5, 0x0, 0x0, 0xffffffffffffffff}}, &(0x7f0000e6bffc)='GPL\x00', 0x7fffffff, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x10}, 0x70) [ 486.510599] overlayfs: filesystem on './file0' not supported as upperdir 14:02:33 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x3, 0x200}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r2 = socket$kcm(0xa, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x18, 0x1, 0x1, "ec"}], 0x18}, 0x0) socket(0x5, 0x80002, 0x80000000) 14:02:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:33 executing program 1: mknod(&(0x7f00000001c0)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x100000, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x95) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) dup2(r2, r1) 14:02:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="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") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)=0x8) 14:02:33 executing program 0: mkdir(0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000580)='/dev/usbmon#\x00', 0xffffffffffffffff, 0x4000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000006c0)) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f00000005c0)) sched_setaffinity(0x0, 0xffffff55, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000380)="8454e645e4d64765f394266ec76df488b11d1f36d9efdb049a8681aee9ee3942eff5fccf4c68d9d5056cb7693f6b5d036594a54304fbd236d09d540dc64140c5ac692dac12ee5c738b870dbe67fd146af85cb64d8dab2d1613042429543832b73a1e9718c9aa110c12cc9ed79e532f0042fc093b55f721d64da4a15d026bfe48e6e49e5b37df340131c523970f669d245b1308097012ff7d3a744615b0dd15c860650a03da44b813f9018171c4d8", 0xae, 0xfffffffffffffffa) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000a00)=""/134) r2 = request_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000004c0)={'syz', 0x0}, &(0x7f0000000500)='overlay\x00', 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000540)=@chain={'key_or_keyring:', r2, ':chain\x00'}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'broute\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000480)=[{}, {}, {}], 0x0}, 0x0) mount(0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000000)='.//ile0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000800)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000000780)=0xe8) mount$overlay(0x0, &(0x7f0000000700)='./file1\x00', &(0x7f0000000740)='overlay\x00', 0x84, &(0x7f0000000b80)=ANY=[@ANYBLOB="78696e6f3d7175746f2c64656661756c745f7065726d697373696f6e732c696e6465783d6f6e2c696e6465783d6f6e2c64656661756c745f7065726d697373696f6e732c776f726b6469723d2e2f66a42a5ef98265e4784cf8f1696c65302f66516c652e2c6c6f7765726469723d2e2f66696c65302f66696c65302c6d657461636f70793d6f66662c7375626a5f726f6c653d21747275737465642b776c616e31747275737465645e73656c6673797374656d76626f786e6574312e2c7365636c61626549ee0ca9a65650a6736465663d62726f757465002c657569643e", @ANYRESDEC=r3, @ANYBLOB=',mask=MAY_WRITE,\x00']) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) getpeername$ax25(r0, &(0x7f0000000ac0)={{0x3, @default}, [@null, @remote, @rose, @null, @rose, @rose, @netrom, @default]}, &(0x7f0000000b40)=0x48) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000680), 0x4) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000240)='.//ile0\x00', r4, &(0x7f00000007c0)='./file0/f.le.\x00') 14:02:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:33 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5, 0x812, r3, 0x0) r5 = syz_genetlink_get_family_id$ipvs(0x0) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x8001, &(0x7f0000000140)={&(0x7f00000000c0)}}, 0x18) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000380)={0x3ff, {{0xa, 0x4e20, 0x81, @mcast2, 0x7}}, {{0xa, 0x4e24, 0xfff, @mcast2, 0x3d4307d4}}}, 0x108) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="000329bd70000039ae9c84fa08443a000600e90b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:33 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 487.401755] device bridge_slave_1 left promiscuous mode [ 487.416015] bridge0: port 2(bridge_slave_1) entered disabled state 14:02:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x480200, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x83, 0x0) connect(r1, &(0x7f0000000040)=@llc={0x1a, 0x5, 0x2, 0x3, 0x100000000, 0xffffffffffffffe1, @local}, 0x80) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x10040) prctl$PR_MCE_KILL(0x35, 0x1, 0x2) [ 487.509507] device bridge_slave_0 left promiscuous mode [ 487.530384] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.769443] device hsr_slave_1 left promiscuous mode [ 487.826181] device hsr_slave_0 left promiscuous mode 14:02:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r1 = socket(0x11, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/audio\x00', 0x4000, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x800000000000a, 0x0) msgsnd(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000009e9253089eac61000000001deb6e2c1ae078f67a2c972a84bcdd4ece3f66edb8401bccebd128cc28eeada5d2dde9ca53acd78c1740cbfc05818200ec2ee65b8be8e22c0edf8196a975ae4400771f61acd9ba7c9075f865ce9192"], 0x1, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000080)) r4 = syz_open_pts(r3, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000040)={0x17}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x400000400103, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, 0x0) r6 = epoll_create1(0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0x4, 0x0, 0x5}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000140)) r7 = gettid() kcmp$KCMP_EPOLL_TFD(0x0, r7, 0x7, 0xffffffffffffffff, 0x0) close(r5) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000080)=0x19, 0x4) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) socket$pppoe(0x18, 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, 0x0, 0x271) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SETVAL(0x0, 0x5, 0x10, &(0x7f0000000100)=0xff) [ 487.885185] team0 (unregistering): Port device team_slave_1 removed [ 487.886307] kauditd_printk_skb: 197 callbacks suppressed [ 487.886316] audit: type=1400 audit(1556719354.401:1715): avc: denied { create } for pid=16927 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 487.976324] team0 (unregistering): Port device team_slave_0 removed [ 488.025344] audit: type=1400 audit(1556719354.461:1716): avc: denied { write } for pid=16927 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:02:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x80000) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f00000000c0)=[{}], 0x0, [{}]}, 0x88) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ftruncate(r1, 0x40000) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r2, 0x0, 0xffe4) fcntl$F_SET_RW_HINT(r1, 0x40c, 0x0) [ 488.116245] audit: type=1400 audit(1556719354.501:1717): avc: denied { map } for pid=16940 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.149298] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 488.218205] audit: type=1400 audit(1556719354.501:1718): avc: denied { map } for pid=16940 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.260565] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 488.306769] audit: type=1400 audit(1556719354.501:1719): avc: denied { map } for pid=16940 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.369990] audit: type=1400 audit(1556719354.511:1720): avc: denied { map } for pid=16940 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.455237] audit: type=1400 audit(1556719354.521:1721): avc: denied { map } for pid=16940 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.549333] audit: type=1400 audit(1556719354.571:1722): avc: denied { map } for pid=16940 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 488.612973] bond0 (unregistering): Released all slaves [ 488.691616] audit: type=1400 audit(1556719354.571:1723): avc: denied { map } for pid=16940 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:35 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x10b8c00000, 0xdffb, 0x9, 0x80000000, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffffe, 0x401, 0xd999, 0x45ec, 0x100, 0x10001, 0x1, 0x9, 0xffffffffffffff24, 0x100000001, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffa, 0x5, 0x10000, 0x20, 0x8, 0x8000, 0x100000000, 0x401, 0x1f, 0x4, 0x2, 0x3f, 0x3, 0x3f, 0x8, 0x0, 0x80000001, 0x2, @perf_bp={&(0x7f0000000140), 0x5}, 0x400, 0x9, 0x10001, 0x2, 0x0, 0x1, 0x6b}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x3) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:35 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3, 0x1, 0x2, 0xc000000, 0x4, 0x8, 0xa4, 0x1f, 0x7fff, 0x3, 0x8}, 0xb) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:35 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) symlink(0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 488.863112] audit: type=1400 audit(1556719354.601:1724): avc: denied { map } for pid=16940 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 492.001286] IPVS: ftp: loaded support on port[0] = 21 [ 492.353210] chnl_net:caif_netlink_parms(): no params data found [ 492.426311] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.433532] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.440432] device bridge_slave_0 entered promiscuous mode [ 492.448770] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.455309] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.462254] device bridge_slave_1 entered promiscuous mode [ 492.483591] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 492.495464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 492.517537] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 492.525024] team0: Port device team_slave_0 added [ 492.532573] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 492.539583] team0: Port device team_slave_1 added [ 492.546160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 492.554865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 492.623441] device hsr_slave_0 entered promiscuous mode [ 492.661273] device hsr_slave_1 entered promiscuous mode [ 492.702698] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 492.710253] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 492.737779] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.744149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.750703] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.757093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.828643] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 492.835825] 8021q: adding VLAN 0 to HW filter on device bond0 [ 492.848157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 492.860441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 492.868318] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.875153] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.886610] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 492.892986] 8021q: adding VLAN 0 to HW filter on device team0 [ 492.906246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 492.914036] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.920407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.933269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 492.940893] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.947289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.973625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 492.981501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 492.995129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 493.021308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 493.028709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 493.037730] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 493.043813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 493.068621] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 493.088404] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 493.107215] kauditd_printk_skb: 94 callbacks suppressed [ 493.107224] audit: type=1400 audit(1556719359.621:1819): avc: denied { map } for pid=16981 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.139858] audit: type=1400 audit(1556719359.621:1820): avc: denied { map } for pid=16981 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.168626] audit: type=1400 audit(1556719359.621:1821): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.198639] audit: type=1400 audit(1556719359.621:1822): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.228907] audit: type=1400 audit(1556719359.631:1823): avc: denied { map } for pid=16981 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.256260] audit: type=1400 audit(1556719359.631:1824): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.287478] audit: type=1400 audit(1556719359.631:1825): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.317837] audit: type=1400 audit(1556719359.631:1826): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.348177] audit: type=1400 audit(1556719359.631:1827): avc: denied { map } for pid=16981 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 493.373427] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 493.380281] audit: type=1400 audit(1556719359.651:1828): avc: denied { map } for pid=16982 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:41 executing program 2: syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 14:02:41 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = getgid() madvise(&(0x7f000007c000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) lchown(&(0x7f0000000000)='./file0\x00', r1, r0) getresgid(0x0, 0x0, &(0x7f0000000180)) 14:02:41 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) recvfrom$inet6(r0, &(0x7f0000000040)=""/35, 0x23, 0x40000000, &(0x7f00000000c0)={0xa, 0x4e20, 0x221, @empty, 0x800}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$VIDIOC_SUBSCRIBE_EVENT(r5, 0x4020565a, &(0x7f0000000140)={0x8001007, 0x200, 0x1}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000000)=0xff, 0x4) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000300)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'veth1_to_team\x00', {0x2, 0x0, @empty}}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7622, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000180)={0x7, 0xf6, 0x308b1bcb, 0x7, 0x0, 0x7, 0x101, 0x176d, 0x3, 0x63, 0xfffffffffffffffe, 0x6e}) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr=0xfffffffffffffff8}}) 14:02:41 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b405a8ddb807002b00000000950000000000000095000000000000806e2a51ae111b0b607deacbd078b33e58b067dad47299185bb33ee758c47d85814d127b8f518b4375b990eb0b"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:41 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$RTC_WKALM_SET(r0, 0x80287010, 0x0) 14:02:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000540)={[], 0x0, 0x9, 0x1074c000}) 14:02:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 14:02:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:41 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x143042, 0x0) eventfd(0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x276) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x800000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) readv(r0, 0x0, 0x122) fchmod(0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) tkill(r1, 0x1000000000016) 14:02:42 executing program 1: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:02:42 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:42 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x2, 0x4}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x505042, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) write$FUSE_GETXATTR(r4, &(0x7f0000000000)={0x18, 0x0, 0x5, {0x6}}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x60300, 'memory'}]}, 0x200600) 14:02:42 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x0, 0x0, 0x1d001, 0x7004], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:02:42 executing program 2: syz_execute_func(0x0) syz_execute_func(&(0x7f00000005c0)="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") 14:02:42 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x8000) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(r3, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x3000, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 496.333374] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 496.378133] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 496.393911] IPVS: ftp: loaded support on port[0] = 21 14:02:43 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) [ 496.471410] net_ratelimit: 2 callbacks suppressed [ 496.471430] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:02:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2, 0xffffffff}) [ 496.743442] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:02:43 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 496.941541] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 497.131555] IPVS: ftp: loaded support on port[0] = 21 [ 499.881135] kauditd_printk_skb: 131 callbacks suppressed [ 499.881145] audit: type=1400 audit(1556719366.391:1960): avc: denied { sys_admin } for pid=17368 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 500.721098] audit: type=1400 audit(1556719366.431:1961): avc: denied { sys_admin } for pid=17368 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.263689] audit: type=1400 audit(1556719366.491:1962): avc: denied { sys_admin } for pid=17448 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:02:48 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xa95b, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b8dafad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="000329c928a78f47747affdbdf250d000000b3694c8dd16b5592033bb11d61113d00d69b716e5bb08513"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:48 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:48 executing program 0: r0 = open(&(0x7f0000000280)='./file0\x00', 0x143042, 0x0) eventfd(0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x276) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x800000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) ioctl$TIOCLINUX6(r0, 0x541c, 0x0) timer_create(0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) tkill(r1, 0x1000000000016) 14:02:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="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") openat$kvm(0xffffffffffffff9c, 0x0, 0x40000, 0x0) 14:02:48 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:48 executing program 1: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 502.512878] audit: type=1400 audit(1556719366.491:1963): avc: denied { sys_admin } for pid=17448 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:02:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 14:02:49 executing program 0: 14:02:50 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:50 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$RTC_AIE_OFF(r3, 0x7002) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000000)={0x1, 0x6, 0xd7b3, 0xbb6, 'syz1\x00', 0x5}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="0000400700000000000027ff070000000000000b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 503.973680] audit: type=1400 audit(1556719366.961:1964): avc: denied { sys_admin } for pid=17927 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 504.420344] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.431387] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.468911] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.498212] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.516760] audit: type=1400 audit(1556719366.961:1965): avc: denied { sys_admin } for pid=17927 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 505.045587] audit_log_lost: 28 callbacks suppressed [ 505.045593] audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 [ 505.081265] audit: audit_lost=17 audit_rate_limit=0 audit_backlog_limit=64 [ 505.122987] audit: backlog limit exceeded [ 505.128983] audit: audit_backlog=65 > audit_backlog_limit=64 [ 505.136972] audit: audit_backlog=65 > audit_backlog_limit=64 [ 505.161770] audit: backlog limit exceeded [ 505.284337] audit: audit_lost=18 audit_rate_limit=0 audit_backlog_limit=64 [ 505.311480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 505.401780] audit: type=1400 audit(1556719367.051:1966): avc: denied { sys_admin } for pid=17281 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 505.426704] audit: audit_backlog=65 > audit_backlog_limit=64 14:02:52 executing program 0: 14:02:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 14:02:53 executing program 2: 14:02:53 executing program 0: [ 506.929636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:02:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 14:02:53 executing program 2: [ 507.061611] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:02:53 executing program 0: 14:02:53 executing program 1: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:02:53 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd703c9abd840000000000b21834109adadba8e10b0000dd444b2c13f36e7ed4ddb6b0f11b78dd3166fd"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:53 executing program 2: [ 508.140752] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 508.211549] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:02:55 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:55 executing program 2: 14:02:55 executing program 0: 14:02:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:55 executing program 1: 14:02:55 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r5, 0x20, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'bcsf0\x00'}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/170) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="000e29c37a1ce6e758fd94025e80859d84c687143951ad3d0ef2bda8dabd7000000000000d00"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:55 executing program 0: 14:02:55 executing program 1: 14:02:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x32, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 14:02:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:56 executing program 0: 14:02:56 executing program 1: [ 510.148180] kauditd_printk_skb: 299 callbacks suppressed [ 510.148190] audit: type=1400 audit(1556719376.661:2169): avc: denied { create } for pid=19126 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 510.233259] audit: type=1400 audit(1556719376.701:2170): avc: denied { write } for pid=19126 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 510.291337] audit: type=1400 audit(1556719376.711:2171): avc: denied { read } for pid=19126 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 510.340813] audit: type=1400 audit(1556719376.781:2172): avc: denied { create } for pid=19126 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 510.368149] audit: type=1400 audit(1556719376.781:2173): avc: denied { write } for pid=19126 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 510.371290] IPVS: ftp: loaded support on port[0] = 21 [ 510.394711] audit: type=1400 audit(1556719376.811:2174): avc: denied { map } for pid=19151 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:56 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:56 executing program 0: 14:02:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x2200000000001200, 0x806, 0xffffffffffffffff}) 14:02:56 executing program 2: 14:02:56 executing program 1: 14:02:56 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x4, @link_local, 'syzkaller1\x00'}}, 0x1e) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000000000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 510.423333] audit: type=1400 audit(1556719376.811:2175): avc: denied { map } for pid=19151 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:57 executing program 1: 14:02:57 executing program 0: [ 510.520949] audit: type=1400 audit(1556719376.831:2176): avc: denied { map } for pid=19151 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:57 executing program 2: 14:02:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x806, 0xffffffffffffffff}) [ 510.653971] audit: type=1400 audit(1556719376.831:2177): avc: denied { map } for pid=19151 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 510.799061] audit: type=1400 audit(1556719376.841:2178): avc: denied { map } for pid=19151 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:02:57 executing program 0: 14:02:57 executing program 1: 14:02:57 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:02:58 executing program 2: 14:02:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 14:02:58 executing program 0: 14:02:58 executing program 1: 14:02:58 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) accept4$netrom(r4, &(0x7f0000000380)={{0x3, @default}, [@bcast, @rose, @remote, @remote, @rose, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x117, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f0000000140), 0x4, r6, 0x1c, 0x1, @in6={0xa, 0x4e22, 0xffffffff, @remote, 0x20000000}}}, 0xa0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000000)="cc0e6e988d5c0a596d857429b971a8439fd00dbae9825d8d022e0dfb73bf6dd4646ebeaf40aa5f6493bbdae2ff0fb949cd485da76e718a1bf51bb271004257b15c0f6ccf07afce414a49d22a6f14f35672", 0x51) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="000b29bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:02:58 executing program 2: 14:02:58 executing program 0: [ 511.831387] IPVS: ftp: loaded support on port[0] = 21 14:02:58 executing program 1: 14:02:58 executing program 2: 14:02:58 executing program 0: 14:02:59 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) 14:02:59 executing program 1: 14:02:59 executing program 3: 14:02:59 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB='x\v)\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:02:59 executing program 2: 14:02:59 executing program 3: 14:02:59 executing program 0: 14:02:59 executing program 1: r0 = socket$unix(0x1, 0x801, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5b94, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) accept4(r1, 0x0, 0x0, 0x0) 14:02:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) lsetxattr(0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=@known='security.capability\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xffffffffffffffab) 14:02:59 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000300)='gre0\x00') 14:02:59 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) 14:02:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000300)='gre0\x00') [ 513.161409] IPVS: ftp: loaded support on port[0] = 21 14:02:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="2c686173682c736d61636b6673726f315c2c10"]) 14:03:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x8000000010, 0x80803, 0x0) write(r1, &(0x7f0000000000)="120000001a002517ffcb8104fef6000d530d", 0x12) recvfrom$packet(r1, 0x0, 0x41, 0x0, 0x0, 0x0) 14:03:00 executing program 0: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f0000000000)=""/56, 0x38, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff}) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0xffffffffffffffff) gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 14:03:00 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:00 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) 14:03:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e0000001d008183ad5de087185082cf0124b0eba0070060002339a00576f9835b3f00009148700000f85ac47c45", 0x2e}], 0x1}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) 14:03:00 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) unshare(0x44000000) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0xe6c7}) connect$x25(r0, &(0x7f0000000180)={0x9, @remote={[], 0x2}}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 14:03:00 executing program 4: r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 513.977633] f2fs_msg: 10 callbacks suppressed [ 513.977648] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 514.020940] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 514.070456] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 514.113101] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 514.154370] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 514.201461] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 14:03:00 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 514.244813] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 514.301311] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 14:03:00 executing program 2: creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000280)="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") syz_execute_func(&(0x7f0000000280)="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") lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000000180), 0x24, 0x0) 14:03:01 executing program 4: r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 514.453817] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 514.485952] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 14:03:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x10000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @loopback, 0x0, 0x2, 'dh\x00'}, 0x2c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x2b) setsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000040), 0x4) [ 514.661479] IPVS: ftp: loaded support on port[0] = 21 [ 514.742604] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.776085] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.813125] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.859958] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.909385] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.949895] Dead loop on virtual device ip6_vti0, fix it urgently! [ 514.972557] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:03:01 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x22, &(0x7f00000000c0)={0x0, 'veth1\x00'}, 0x18) [ 514.997160] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:03:01 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="200026bd7000fcdbdf250100000000000000014100000020001700000001fffffffe6574683a626f6e645f736c6176655f3000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4810}, 0x4000000) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x400040, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) execveat(r5, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000040)='/dev/autofs\x00', &(0x7f00000000c0)='9security\xbe\x00'], &(0x7f0000000380)=[&(0x7f00000001c0)='\x00', &(0x7f0000000300)='system\x00'], 0x1800) close(r4) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40000) r6 = syz_genetlink_get_family_id$ipvs(0x0) fcntl$notify(r3, 0x402, 0x6) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="000329bd7000006f4a168316f4272bc28d380000000d00000008000600ad0b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 515.112894] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 515.172220] kauditd_printk_skb: 171 callbacks suppressed [ 515.172228] audit: type=1400 audit(1556719381.691:2350): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:01 executing program 4: r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 515.342503] audit: type=1400 audit(1556719381.731:2351): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4188aea7, &(0x7f0000000080)={0x1, 0x0, [{0x80000008}]}) [ 515.480168] audit: type=1400 audit(1556719381.781:2352): avc: denied { map } for pid=19284 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 515.613595] audit: type=1400 audit(1556719381.811:2353): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:02 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x7, &(0x7f00000000c0)={0x1, 'veth1\x00'}, 0x18) 14:03:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x3, 0x1}) [ 515.781547] audit: type=1400 audit(1556719381.821:2354): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:02 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 515.972592] audit: type=1400 audit(1556719381.851:2355): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 516.095655] audit: type=1400 audit(1556719381.851:2356): avc: denied { map } for pid=19284 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 516.214331] audit: type=1400 audit(1556719381.901:2357): avc: denied { map } for pid=19290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:02 executing program 0: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x2}) [ 516.334960] audit: type=1400 audit(1556719381.901:2358): avc: denied { map } for pid=19290 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 516.440915] audit: type=1400 audit(1556719381.911:2359): avc: denied { map } for pid=19290 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:03 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:03 executing program 2: pause() syz_genetlink_get_family_id$ipvs(0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") openat$pfkey(0xffffffffffffff9c, 0x0, 0x8100, 0x0) syz_execute_func(&(0x7f0000000080)="73004a2be92c6293980f053ef3aec4a37bf0c50141e2e922eb66d995f214400666440f383dbe08000000ed660f38463da16379637902000000164ad2dede613687b1b60001c482514654c442f93376073700d54bd4d4491e2f16c2e54c4cbec5c54d0f2c718f56eec442319ebb70fe6581f0430fc0b267f34cb456b2585641564105ba16f2ae66410f3a162888c423c96cb83d000000fe66410fd1e4c4c2c3f665f98f69609bfb87a8e1430fae27660f3a20b9feefffffead8a1a12ad764c421a83a5fc0c0660f3804e0c442fd1d23c4a2fd91542100400f38253d0300000067ddeac4c2801d9c96c9e8e9362665e94612c8009ad0818194d8000f092ddd8f0b00c4a17ae64295c401977c4ffeffd2fb2e36646466264683b9080000000d5df82e440fdd0636b2aac4224741afa20f6baf00c4e399784104c0414e598374ff0a07450f633c0caccd1758582e660ffb09f20f1dbe00100000c401296becc565978047910002c10b47cc42e0ecf92f5c65002d0800000042b6a7a75e0f4401a9bb000042c4414974ecd5313166dbd1f0ff41653bec") [ 517.391518] IPVS: ftp: loaded support on port[0] = 21 14:03:04 executing program 1: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f0000000000)=""/56, 0x38, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getpgid(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) 14:03:04 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000001900)="c4e3f9604832074a2be9c482b8f3c9980f0531f3aec4a37bf0c50341e2e98f2978cb4b9945982821c401fa2ce8c463f9615f000c92aef047830e5ec4a105e8044cf30f2c947b000000002525000e818f470fc4024d3c4800ea6dc4c3017d7f0000008080e2853665f3490f2cf1f242a769e08f4cbec5c4c2858c3f8f51c4e295afac5143000000c4213e5377000043d9597dbfc7c74111b900000000a2438f34b267f36ab4c4e1b9564175569036286c6cd0552fed2f1f004846f3466dfa8fdf08e42ea25640b1b10909660fdf530967410f58d1f2450f70b90c00000000c402bd0184454ecc8731866ce7fe0246dec43b7d0fc402ed02d5e0660f38f65e0c0cbd078fe894dbddda470ae26cbb3cbb3c0209912af3430f47bb000000000000456c400f66879635f03db62f818194d800d800dd480501fec441057d94628d590000b1c4c1f95bb800000020cbffffc2bd7c6df38800dc4ddc4d42845100c4a17c10028fa818a2a18ef100000806e99f027e20c421e5fefb002138c9ba0f000000c422e6912cb183740a076466420f3a0b30da64460f14a00000ffffc4e271976feaed36660f38058b976192361d09f4f5e5660fed3d050100008947910002c1045c0b47cc4f86f4f4389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c000000") openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) 14:03:04 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0xb, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x100000000, @remote, 0x7}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1000000000000001, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000092486dadb14d0ad3ecc8f38f76a42bc400d71945496d9357cbcd3669b059b024add69d759aa46ee34f3ff5b2d127a000000000000000f963b66cf2b64bb1add454a5155d7aec62ab145841c342fc7a01a95102e84091f6020eb0d6c149a847b9ec4b0200fee1c86700a06d7c09de043302f3d96298e51a81688ee0871edfc7b6d1ab569da4e5c4db644da162dbb30282fd4574f3fdba136c5f00000000000000", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:04 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:04 executing program 2: syz_execute_func(&(0x7f0000000e00)="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") 14:03:04 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) unshare(0x44000000) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0xe6c7}) connect$x25(r0, &(0x7f0000000180)={0x9, @remote={[], 0x2}}, 0x12) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:03:05 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:05 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x21, 0x0, 0x0) 14:03:06 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r6, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00!\x00\x00!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r4) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={'nr', 0x0}, 0x6, 'syz0\x00', @default, 0x8, 0x0, [@null, @null, @bcast, @null, @default, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r7, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:06 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000a80)="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") [ 520.194542] kauditd_printk_skb: 165 callbacks suppressed [ 520.194550] audit: type=1400 audit(1556719386.711:2525): avc: denied { map } for pid=19587 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 520.776144] audit: type=1400 audit(1556719386.801:2526): avc: denied { map } for pid=19587 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:07 executing program 1: pause() syz_execute_func(0x0) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f00000007c0)="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") syz_execute_func(&(0x7f00000002c0)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c50341e2e926b5c9f956660f5b9591d300008d3581810000262fd9f96646da4e32c4c2b9b6b90000000000d2dec461c44299ae4000c421795184fb22910000c422558e24d50f000000470f9080008047f08fe97c810f69e08f4cbec5c4c2858c3f2d56c4613f3ac21d9090c7abc4c3fd0171021b213ea51313000043d9497d410fa9a642857e00c441555474f6fec30f3a603d06f0ffff00c4e16d71d4d2d5838305ba16f2aed9fdf045832d950000002cf5eba225adeab413c4c37d096208c2c481fa706b00f9ef0008c481b1f39f0d000000c401511644bf4100b150400f381da900e001f0428155fdd2cb0000c6d59134ff67d20066dee440dcfb3646d39bce00000064f30fc7b0d6250000047b208f49580197feffff7f7f80a009210000df3b7d0f12e400f4260fe88c4200000000a8c4e190410addc03b00214b05337b6b440f9c650066450f3823de0af3430fc4c17829c8c463ad0b5890ca6c0f84500000006466420f3a0b0100d800dbca238fe978cce16a85859e6d6d8175759d66666466410fe31b660f3830c8c462a52b6e0b47f6d0f0f0839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c10020f154122c4e171f56d00b2aa246681380011c4026726670f010e0f7e54880d07c40155f64e06ecb268c4a17b2c2249fcfc8205e26236f3440f7f1797972ec1048e5c0b5c0b5c670f0d5b0064450fe242d9c481635a9c70d3813811fa174e484e40c91b41fc9d1b1b0fadd5818a2b233333fdffff7f45ee880c0000008fc97881b500000000") [ 521.148820] audit: type=1400 audit(1556719386.811:2527): avc: denied { map } for pid=19601 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:07 executing program 3: pause() syz_execute_func(&(0x7f0000000240)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c463fd0925af04928c000510d46f") syz_execute_func(&(0x7f0000000700)="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") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) [ 521.342422] audit: type=1400 audit(1556719386.811:2528): avc: denied { map } for pid=19601 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:07 executing program 0: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x3f, &(0x7f0000000040)) pause() syz_execute_func(&(0x7f0000001000)="c4e3f9614832f04a2be93699980f053ef3aec4a37bf0c50541e2e926b5c945982821660fe67204a30000262ff342906646da4e3264470fae966b000000c0c561dc55b1e6172525000e810f1844f200666547de3c914580008080e2859ecf6cf365df250d000000ede97c810f69e08f4cbec5c4c2858c3f8f56caca612fc21d90660f767df643d9497dbf82595943c4423d924cb701e7e63cb3d255ece4a2e1970e6641d50f1d780716286c6c0fbc7b1f00008f08e4a25600b1c4e205b6ae056c00000909660fdf53098f4960f93e26f37d0756c7c77b027dbe42eae2897474d8661edcc475585f5fc2f043fe02660f38de8e85e1f3263b7d260f2f42cd7520c001d9fac4027932fd034c4c0fc4e2210e8d20d28ccc9e456bbba9efc4c2190c0c09000000c4a38d7838f69b0f4047028f2944928d71000000d80066460fee410ec4a18165750005c462a52b610bae14ae147ae64295589cffffc3c44345690afb4577cb0c0cc463510d5f0035c4a17c1002900606b2aa260f38c9ba0f0000000f485c5e2ec422f941d38374fb0a07c401f1eb27f247acecc4c17910d6f464f046190109f4747971970f1ecc0b47cc47cc5c38259f060f0fc9c94401a9bb000042d8fb493c64ecec31c45151f172e5003422") [ 521.425560] IPVS: ftp: loaded support on port[0] = 21 14:03:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) [ 521.493425] audit: type=1400 audit(1556719386.841:2529): avc: denied { sys_admin } for pid=19674 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 521.706881] audit: type=1400 audit(1556719387.031:2530): avc: denied { sys_admin } for pid=19728 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:08 executing program 3: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x3a74, &(0x7f0000000140)) io_setup(0x420, &(0x7f0000000080)) pause() syz_execute_func(&(0x7f00000001c0)="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") [ 521.778836] audit: type=1400 audit(1556719387.031:2531): avc: denied { sys_admin } for pid=19728 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 521.889955] audit: type=1400 audit(1556719387.091:2532): avc: denied { map } for pid=19601 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.000793] audit: type=1400 audit(1556719387.201:2533): avc: denied { map } for pid=19601 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.059858] audit: type=1400 audit(1556719387.201:2534): avc: denied { map } for pid=19601 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 522.063541] bond0: Error: Device is in use and cannot be enslaved [ 522.139470] IPVS: ftp: loaded support on port[0] = 21 14:03:08 executing program 2: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_open_dev$loop(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="73004a2be92c6293980f053ef3aec4a37bf0c50141e2e922eb66d995f214400666440f383dbe08000000ed660f38463da16379637902000000164ad2dede613687b1b60001c482514654c442f93376073700d54bd4d4491e2f16c2e54c4cbec5c54d0f2c718f56eec442319ebb70fe6581f0430fc0b267f34cb456b2585641564105ba16f2ae66410f3a162888c423c96cb83d000000fe66410fd1e4c4c2c3f665f98f69609bfb87a8e1430fae27660f3a20b9feefffffead8a1a12ad764c421a83a5fc0c0660f3804e0c442fd1d23c4a2fd91542100400f38253d0300000067ddeac4c2801d9c96c9e8e9362665e94612c8009ad0818194d8000f092ddd8f0b00c4a17ae64295c401977c4ffeffd2fb2e36646466264683b9080000000d5df82e440fdd0636b2aac4224741afa20f6baf00c4e399784104c0414e598374ff0a07450f633c0caccd1758582e660ffb09f20f1dbe00100000c401296becc565978047910002c10b47cc42e0ecf92f5c65002d0800000042b6a7a75e0f4401a9bb000042c4414974ecd5313166dbd1f0ff41653bec") [ 522.248804] bond0: Releasing backup interface bond_slave_1 14:03:08 executing program 3: pause() syz_genetlink_get_family_id$ipvs(0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x1, 0x400001) syz_execute_func(&(0x7f0000000540)="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") 14:03:09 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x2}, 0x8) listen(r0, 0x40001) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) bind$isdn_base(r4, &(0x7f0000000000)={0x22, 0x6a, 0x0, 0x2, 0x3f6b}, 0x6) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="000000007b7b1b32241cb927f9fc656c6e6cf0d653f842e7", @ANYRES16=r5, @ANYBLOB="000329bd7000020000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:10 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:10 executing program 3: pause() syz_execute_func(0x0) syz_execute_func(&(0x7f00000002c0)="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") 14:03:10 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000a40)="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") 14:03:10 executing program 0: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x3a74, &(0x7f0000000140)) pause() syz_execute_func(&(0x7f00000001c0)="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") 14:03:10 executing program 2: syz_genetlink_get_family_id$tipc(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) r2 = syz_open_pts(r1, 0x0) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xc86}) read(r2, &(0x7f0000000100)=""/19, 0x13) mkdir(0x0, 0x60) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x80) 14:03:10 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000000000)=""/62, &(0x7f0000000380)=""/95, &(0x7f0000000400)=""/135, 0xf000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000001000000d7e605000000000000000b96"], 0x18}, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)}}], 0x400001f, 0x0) [ 523.811344] IPVS: ftp: loaded support on port[0] = 21 14:03:10 executing program 1: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x8000000000000102, &(0x7f0000000140)) io_setup(0x4, &(0x7f0000000000)) pause() syz_execute_func(&(0x7f00000001c0)="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") 14:03:11 executing program 2: syz_execute_func(&(0x7f0000000600)="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") 14:03:11 executing program 3: io_setup(0x7, &(0x7f00000000c0)) io_setup(0x8000000000000102, &(0x7f0000000140)) io_setup(0xfc, &(0x7f0000000080)) pause() syz_execute_func(&(0x7f00000001c0)="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") 14:03:11 executing program 0: pause() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dcc0510d46f") syz_open_procfs(0x0, 0x0) syz_execute_func(0x0) syz_execute_func(&(0x7f0000000340)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c50141e2e926b5c9459838218d00a30000262f0df342906666da4e3292a1637963790200000000d264660ffc7eb061dc55b1e6172525000e8182b00080008080e2859ecf491e2f16f0410f117b0969e08f4cbec5c54de90d47e82c718fc4c3bd696a739ec4213e537700c443d9497dbf59f0438f34b267f36ab40f688030000000564105ba16f2ae66410f3a162888c423a46c53b885000000fefe41ff502909660fdf53098f69609b5687e8e17474d8b5c1c4a1213a5f42c042c038de8e85e1f326470f5f103b7d0f12e400f445d8261bd71bd7ca30caab6abbd9c4022191f30f52a30d0000002af3420f2a520000002665e94612c8000f8444000000d0818194d80044512ef04609ba4717456588f4f4460f5f00c432a17ae6429595ffc4c3bd7c6d830045770c64e42e440bdd970606b2aad9c70f485c5e2e8fa97812c08374fb0a07c401f1eb27f247aceced36660f38058b976192361d09f5e59780479100420f0f31bb045c0b82cc47cc2f5c65002d0800a3000000417956a2998999999f59060f0f8153000000ae2e0f38f11ba9bb0000429b39c4617ddd880c0000003523") 14:03:11 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:11 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000440)={0x1f, {{0x2, 0x4e20, @loopback}}, 0x0, 0x3, [{{0x2, 0x4e24, @empty}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e24, @empty}}]}, 0x210) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x90, r6, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x7c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xba, @dev={0xfe, 0x80, [], 0xa}, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x3b}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xfff, @rand_addr="aab85af9eb1705ab77f61ddb761ea168", 0x1}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x6c21}}}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x8800}, 0x1) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x7, @empty, 0x1886}, 0x1c) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r7, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 524.961633] IPVS: ftp: loaded support on port[0] = 21 14:03:11 executing program 1: pause() syz_execute_func(0x0) syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f00000007c0)="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") syz_execute_func(0x0) [ 525.206973] kauditd_printk_skb: 163 callbacks suppressed [ 525.206981] audit: type=1400 audit(1556719391.721:2698): avc: denied { map } for pid=19997 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 525.299201] audit: type=1400 audit(1556719391.721:2699): avc: denied { map } for pid=19997 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 525.354859] audit: type=1400 audit(1556719391.731:2700): avc: denied { map } for pid=19997 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 525.393392] audit: type=1400 audit(1556719391.731:2701): avc: denied { map } for pid=19997 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 525.435844] audit: type=1400 audit(1556719391.741:2702): avc: denied { map } for pid=19997 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:12 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x2, 0x0, [{0xd, 0x79b}, {0x1}]}) [ 525.677474] audit: type=1400 audit(1556719391.741:2703): avc: denied { map } for pid=19997 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000200)={0x0, 0xfffffffffffffee5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='dctcp\x00', r4) ioctl(r3, 0x1000008914, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0), 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) pause() syz_execute_func(&(0x7f00000000c0)="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") setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000400)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sysfs$3(0x3) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0xfffffffffffffeaa) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x4f) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000440)=[@in], 0x10) sendto$inet(r1, &(0x7f0000000700)="f4", 0x1, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 14:03:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5451, 0xffffffffffffffff) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xa8000, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000100)={0x82f4, 0x3, 0x93e, 0x9, 0xa9e, 0x5, 0x3}) msgctl$IPC_RMID(0x0, 0x0) 14:03:12 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x2}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) [ 526.261205] audit: type=1400 audit(1556719391.741:2704): avc: denied { map } for pid=19997 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:13 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001740)=[{&(0x7f0000000080)=""/201, 0xc9}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000440)=""/144, 0x90}], 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) sendmmsg(r0, &(0x7f0000000000)=[{{&(0x7f0000002200)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000002700)}}], 0x4000000000000d2, 0x0) [ 526.623311] audit: audit_backlog=66 > audit_backlog_limit=64 [ 526.629154] audit: audit_lost=52 audit_rate_limit=0 audit_backlog_limit=64 [ 526.639851] audit: audit_backlog=66 > audit_backlog_limit=64 14:03:14 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:15 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc0189436, &(0x7f0000000140)) 14:03:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x32, 0x835, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, 0x0) r1 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000600)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f47159", 0x60, r1) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x200, 0x0) 14:03:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@bridge_getneigh={0x20, 0x1e, 0x411}, 0x20}}, 0x0) 14:03:16 executing program 0: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046207, 0x0) [ 530.369633] kauditd_printk_skb: 525 callbacks suppressed [ 530.369642] audit: type=1400 audit(1556719396.881:2927): avc: denied { create } for pid=20559 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 531.372596] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.374284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.378484] audit: audit_lost=154 audit_rate_limit=0 audit_backlog_limit=64 [ 531.388125] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.396730] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.400617] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.406809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.410682] audit: audit_backlog=65 > audit_backlog_limit=64 [ 531.418888] audit: audit_backlog=65 > audit_backlog_limit=64 14:03:19 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:19 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="0071d23e4b837183c97fb11182cef8b8cea0e50e777ffce6f0138617422aa39fc3e18c7200678ca323d911da1a971302"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 533.414212] IPVS: ftp: loaded support on port[0] = 21 14:03:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) dup3(r0, r1, 0x0) 14:03:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0) 14:03:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x51) 14:03:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007010000"], 0x20) 14:03:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8008, 0x0) execve(0x0, 0x0, 0x0) r1 = gettid() kcmp(r1, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 14:03:21 executing program 2: socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) 14:03:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) dup3(r0, r1, 0x0) 14:03:21 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf4, 0x10c, 0x0, {"053d355e113119d5df9683b6ccdc024d0d2b91a03451a99bb94b0a4f93f1d2fe4fd43c15dafda4861fb9cac780e4033c287655ee6fa7e5b0d5f3fd745c2bb7a0e36f2982fce918278ad687c6732699e4f7b800000060854f1a9dcfc01ce1cd73c37628ffff3507999adacd938df0060b0154d38f691cefb6e147853f0653d149d8596d683db7f0f2b5221ac22eddfeaf1f106fca33c808cc729d4481464ecae622e1a805574c4de657ba1bee16841f3a6375fba3dc3a8f391089846fe14575ce66dd76e62fc403758ba5ae2bf91547d197fce185566178dd2923f7e5ed8d7929cc42a52fd0257f4ed153975370d541fa559a"}}, {0x0, "b7b11a12df8cf3855b5625c9e85a6a221cc51ece081f4a0d87a38ac309690cae461042a19a49a506a4121052a2e4842e96d1acd55f4593fb2f2ba8219f3acc0017119b6a011b1c94860432e03811f4f94768ddda1b7fe7e351532f71d7ac0737ee7bddf6d1744656b1236b839689cab804efd6ef092515714dea3e23f5f4e256"}}, 0x0, 0x18e, 0x0, 0x1}, 0x20) 14:03:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="0c02b5b598cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c003f008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da767667664d0f7efa8f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c4c23bdcc4bbbb5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df646736676670664336660fd2938c0000000f01c36666450f17720d14111d54111d00") 14:03:21 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x8000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 535.357552] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 535.372320] kauditd_printk_skb: 760 callbacks suppressed [ 535.372328] audit: type=1400 audit(1556719401.891:3067): avc: denied { map } for pid=21129 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 535.423740] IPVS: ftp: loaded support on port[0] = 21 14:03:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x18100) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0xb) [ 535.592690] audit: type=1400 audit(1556719401.891:3068): avc: denied { map } for pid=21129 comm="grep" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 535.759565] audit: type=1400 audit(1556719401.971:3069): avc: denied { map } for pid=21139 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 535.967924] audit: type=1400 audit(1556719401.971:3070): avc: denied { map } for pid=21139 comm="grep" path="/bin/grep" dev="sda1" ino=1483 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:22 executing program 0: r0 = socket$inet6(0xa, 0x10000000000002, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0xf, 0x0, &(0x7f0000000080)) [ 536.117720] audit: audit_backlog=65 > audit_backlog_limit=64 [ 536.145246] audit: audit_backlog=65 > audit_backlog_limit=64 [ 536.152636] audit: audit_backlog=65 > audit_backlog_limit=64 14:03:22 executing program 2: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000008fd0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:03:22 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 536.166295] audit: type=1400 audit(1556719401.981:3071): avc: denied { map } for pid=21139 comm="grep" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 536.203650] audit: audit_backlog=65 > audit_backlog_limit=64 [ 536.211778] audit: audit_backlog=65 > audit_backlog_limit=64 14:03:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[], 0x0, 0x20}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:23 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 14:03:23 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd7000cbacb06dea471a0c00b5d133130901000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:23 executing program 0: syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x40046302}], 0x0, 0x0, 0x0}) 14:03:23 executing program 1: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0xa0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x2, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000110000000000000000006263000000000000000000000000000073010030000002000000ffff000000007663616e300000000000000000000000766c616e300000000000000000000000ffffffffffff0000000000000000000000000000000000000000b8000000b800000030010000"]}, 0x118) 14:03:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x0, 0x4002011, r1, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 14:03:24 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 537.671397] IPVS: ftp: loaded support on port[0] = 21 14:03:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_emit_ethernet(0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="50000000907800fbdd9180c7075e868315906e57ba5f0eb343f8ccf9a080e8dd00216e1249bc73df24badcc74100"/68], 0x0) 14:03:24 executing program 3: r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)={{0x108, 0x49, 0x7, 0x21e, 0x93, 0x20, 0x2a3, 0x84c}, "2b3186222ab14eb55fa3e4b4ea59eb5679d287bfee2400756e11af59556d9980d38b20b8015a4bd51a60699961bde739b5aeca769ac5ba734ceaaeef523f338cfb9969c2ef5789492aa33b887c5a800765ad7d35fd82e6e6a503b1e46464bb190af51e4bf96fe11b34c64c9a327a4d03c92fc5a8a6249f083b452071149eceabde627ee88de7fae4215c269d2af2", [[]]}, 0x1ae) r1 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, 0x0) mq_notify(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}) dup2(r0, r1) 14:03:24 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1cfc694d48b3678c2ab0", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:24 executing program 2: socket$inet(0x2, 0x0, 0x1e) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) 14:03:24 executing program 0: r0 = socket$inet6(0xa, 0x0, 0xffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x7, 0x3) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f00000006c0)="eb3c130105a4874e97bfeb58", 0xc, 0x2000000000}], 0x1010802, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0/file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000000d00)=ANY=[@ANYBLOB="840765e20000000000000000ca28ff13653d93d352afd46a6262ff0016dfd3c07c875839f5469447bccc2b48387108a089b9ef15d4e0a32686eb65b2b1889aa715645588b7786693de29abce6d594524d7094a42aaac86cfe9c30300b092afb4fd3500080000000000002546d6940c26e9047cf9d1ebe622b4ad55e779c87b1f4e2b4fd29edbeb3c8054efcfdd008d7981246d11e6aa93816ba43b2a766802fea1544dd01646bbec5537f9ffffffffffffff2e7f24dcd47923f97790090bc79ab96ad8922500100000b93f0a24ec8b5f26dfb6d130c4406e4d9715edbe9b2334562d9bfc7e9f8394c3e274daccd9fdbd0219b0f3"]]) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000001140)) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0xa2081, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x9) fstatfs(r2, &(0x7f0000000400)=""/128) 14:03:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) 14:03:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[], 0x0, 0x20}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:25 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 540.521171] kauditd_printk_skb: 254 callbacks suppressed [ 540.521180] audit: type=1400 audit(1556719407.031:3238): avc: denied { map } for pid=21257 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:27 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1e) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) 14:03:27 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd7000000000162d52760008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 541.635777] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 542.153386] audit: type=1400 audit(1556719407.161:3239): avc: denied { map } for pid=21429 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:29 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 544.108887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.115284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.418450] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.432450] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.486914] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.527662] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.538526] audit: audit_backlog=65 > audit_backlog_limit=64 14:03:31 executing program 3: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) connect$x25(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 544.578529] audit: audit_lost=395 audit_rate_limit=0 audit_backlog_limit=64 14:03:31 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x0, 0x4002011, r1, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000240)={0xff, 0x20000000000000}) [ 545.550543] kauditd_printk_skb: 173 callbacks suppressed [ 545.550553] audit: type=1400 audit(1556719412.061:3319): avc: denied { sys_admin } for pid=22232 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 545.611092] audit: backlog limit exceeded [ 545.661714] audit: audit_lost=429 audit_rate_limit=0 audit_backlog_limit=64 14:03:32 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 546.831470] audit: backlog limit exceeded [ 547.791896] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.792974] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.797736] audit: audit_lost=430 audit_rate_limit=0 audit_backlog_limit=64 [ 547.814507] audit: audit_backlog=65 > audit_backlog_limit=64 [ 547.820332] audit: audit_lost=431 audit_rate_limit=0 audit_backlog_limit=64 [ 547.820500] audit: audit_backlog=65 > audit_backlog_limit=64 [ 548.925121] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 14:03:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, 0x0}, 0x78) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 550.864914] kauditd_printk_skb: 333 callbacks suppressed [ 550.864923] audit: type=1400 audit(1556719417.381:3422): avc: denied { map } for pid=22079 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:03:37 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000040)=0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="961b2e1ee42c919e09e6a700004f723d1eabd7748a0a0a4dcb4f964633b0f579b6577c181a7b22705e25a44bc0a4aa14bcd9716a49a34df87585deadb935ae5a34975a2951aa3b990ab0f71684060ff6cf5c9f", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0xfc4, 0x9, 0x5, 0x7fff}, 0x6) [ 552.952455] audit: type=1400 audit(1556719417.571:3423): avc: denied { map } for pid=23448 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 553.756637] IPVS: ftp: loaded support on port[0] = 21 14:03:40 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x0, 0x8, [], 0x0}) [ 554.034242] audit: type=1400 audit(1556719417.651:3424): avc: denied { sys_admin } for pid=23406 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:40 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x24012, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x0, 0x4002011, r1, 0x0) [ 554.888301] audit: type=1400 audit(1556719417.651:3425): avc: denied { sys_admin } for pid=23406 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:41 executing program 3: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x753, 0x22, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) 14:03:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 555.531158] audit: type=1400 audit(1556719417.731:3426): avc: denied { map } for pid=22079 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 555.891190] audit: type=1400 audit(1556719418.001:3427): avc: denied { map } for pid=23448 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 556.040407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.098766] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.138739] audit: audit_lost=509 audit_rate_limit=0 audit_backlog_limit=64 [ 556.184642] audit: audit_lost=510 audit_rate_limit=0 audit_backlog_limit=64 [ 556.196557] audit: type=1400 audit(1556719418.001:3428): avc: denied { map } for pid=23448 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 556.230878] audit: backlog limit exceeded 14:03:42 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c52") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 556.240413] audit: backlog limit exceeded 14:03:42 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000380)={'mangle\x00'}, &(0x7f00000000c0)=0x54) r6 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r4) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="d2af5828f086b75b00000d00000008000600e1dc0b00"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 556.365887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 556.416377] audit: audit_lost=511 audit_rate_limit=0 audit_backlog_limit=64 14:03:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x7c, 0x0, [0x40000105], [0xc1]}) [ 556.581137] protocol 88fb is buggy, dev hsr_slave_0 [ 556.586279] protocol 88fb is buggy, dev hsr_slave_1 14:03:43 executing program 1: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) mlockall(0x0) sync() sync() socket$unix(0x1, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6(0x1c, 0x10000002, 0x80000000) accept(0xffffffffffffff9c, 0x0, 0x0) 14:03:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000200)) r2 = syz_open_pts(r1, 0x0) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xc86}) read(r2, &(0x7f0000000100)=""/19, 0x13) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) 14:03:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 14:03:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa080d3e51eb077d13500000000000200010000a00000000000000000500e50000070000001f00000000f2ff2500000000000002000100000000000521000000000a00000000010000ff17000f0f8926de3b00"/120], 0x78}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10e}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 14:03:44 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(0xffffffffffffffff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:44 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c52") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x3000, 0x0, 0x7004], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:44 executing program 3: 14:03:44 executing program 0: [ 558.402323] IPVS: ftp: loaded support on port[0] = 21 14:03:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x3000, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x8000) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(r3, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x1800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0xffffffff, 0x400000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000440)=0x1) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xffffffff, 0x2) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000000)) dup2(r2, r1) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000100)) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000004c0)={0x4, &(0x7f0000000300)=[{}, {0x4, 0x7, 0x695c, 0x800}, {0x0, 0x6, 0x2, 0x4}, {0x7f, 0xf05, 0x8001, 0xfff}]}) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) sendfile(r3, r4, &(0x7f00000000c0), 0x8000fffffffe) 14:03:45 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c52") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x8000) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(r3, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:03:45 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:46 executing program 2: 14:03:46 executing program 0: 14:03:46 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319b") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:46 executing program 3: 14:03:47 executing program 1: [ 561.044291] kauditd_printk_skb: 155 callbacks suppressed [ 561.044300] audit: type=1400 audit(1556719427.361:3583): avc: denied { write } for pid=24439 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:03:48 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40000, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x4400, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 561.915618] audit: type=1400 audit(1556719427.731:3584): avc: denied { map } for pid=24573 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.531004] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.542696] audit: type=1400 audit(1556719427.731:3585): avc: denied { map } for pid=24573 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 562.566547] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.568736] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.575548] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.597868] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.624575] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.630407] audit: audit_lost=512 audit_rate_limit=0 audit_backlog_limit=64 14:03:49 executing program 2: 14:03:51 executing program 0: 14:03:51 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319b") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(0x0, 0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 566.067307] kauditd_printk_skb: 476 callbacks suppressed [ 566.067315] audit: type=1400 audit(1556719432.561:3754): avc: denied { setgid } for pid=25296 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:52 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x7, 0xfffffffffff7fffb) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fsetxattr(r1, &(0x7f0000000180)=@random={'btrfs.', '\x00'}, &(0x7f00000001c0)='/dev/autofs\x00', 0xc, 0x3) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) open_by_handle_at(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="4dec4f9598df2ed9a20279a66b0498397afd9059bcc349e72cc44800000004000000f95f98fbc648e554c683cb771070facb97804f1a2a198f5f010000000100000007df4fab47372527a84d90229bd457185e8b2323"], 0x101000) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f00000004c0)={'filter\x00', 0x70, "942abfb11f5519de090a2470d2193a2e1bd7c75a144d1c53c8aa4dacaf9f334e88aa10e6c6551616831c1efc340b39f9b9a0d984ef853e7c2ef40542f7138334140a1d02f38d26daaa3e0a8bbb54b493dc83b42d81c4828376a3541b3c9f42d9d9331b225aeb7549d89043edf31bbc9c"}, &(0x7f0000000040)=0x94) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) pipe2(&(0x7f00000000c0), 0x80000) waitid(0x0, r5, &(0x7f0000000380), 0x80000000, &(0x7f0000000400)) r6 = syz_genetlink_get_family_id$ipvs(0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x5) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="000329bd704fa0af19edc5885bc21dc51235871c48933ec05abb94"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:03:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') [ 567.282946] audit: type=1400 audit(1556719432.561:3755): avc: denied { setgid } for pid=25276 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 568.124771] audit: type=1400 audit(1556719432.571:3756): avc: denied { setgid } for pid=25284 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 568.791756] audit: audit_backlog=65 > audit_backlog_limit=64 [ 568.792919] audit: audit_backlog=65 > audit_backlog_limit=64 [ 568.797605] audit: audit_lost=617 audit_rate_limit=0 audit_backlog_limit=64 [ 568.805573] audit: audit_backlog=65 > audit_backlog_limit=64 [ 568.821923] audit: audit_backlog=65 > audit_backlog_limit=64 [ 568.827740] audit: audit_lost=618 audit_rate_limit=0 audit_backlog_limit=64 [ 568.836956] audit: audit_backlog=65 > audit_backlog_limit=64 14:03:55 executing program 2: r0 = socket$packet(0x11, 0xa, 0x300) recvmsg(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@tipc, 0x80, 0x0}, 0x0) socket(0x100000000000011, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x88001) 14:03:56 executing program 3: 14:03:56 executing program 1: [ 571.076319] kauditd_printk_skb: 340 callbacks suppressed [ 571.076328] audit: type=1400 audit(1556719437.591:4012): avc: denied { setgid } for pid=26022 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:57 executing program 0: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x3, 0x8, 0xffffffffffffffff}, 0x14}}, 0x0) 14:03:57 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r4, 0x1ff}, &(0x7f0000000180)=0x8) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="00007cee61fc37a60000", @ANYRES16=r6, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 571.561408] IPVS: ftp: loaded support on port[0] = 21 14:03:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000001180)='threaded\x00', 0xfc9a) fallocate(r0, 0x0, 0x0, 0x10001) lseek(r0, 0x0, 0x3) [ 571.639957] audit: type=1400 audit(1556719437.591:4013): avc: denied { setgid } for pid=25975 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.022784] audit: type=1400 audit(1556719437.581:4011): avc: denied { setgid } for pid=26014 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:58 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319b") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:03:58 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x3], 0x7a}, 0x6}, 0x1c) 14:03:58 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 14:03:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89e6, &(0x7f0000000000)) 14:03:58 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000000)=[0x7], 0x1, 0x5, 0x3f, 0xffffffffffff814d, 0x3, 0xb07, {0xae2, 0xffff, 0x80000000, 0x7fffffff, 0x101, 0x6, 0x6, 0x4, 0x200, 0xf03d, 0x9, 0x5, 0x5, 0x2, "c28e0fb5dcd5909b2ecf373bdbf17dcbb13f4f43844d3b6d6f71fa86128e0bba"}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000040)={0xffff, 0x1, 0x8, 0x800, 0x7ff, 0x9}) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 572.301111] audit: type=1400 audit(1556719437.601:4014): avc: denied { setgid } for pid=26014 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.508092] audit: type=1400 audit(1556719437.741:4015): avc: denied { setgid } for pid=26022 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x1e, 'memory'}]}, 0x200600) [ 572.729393] audit: type=1400 audit(1556719437.741:4016): avc: denied { setgid } for pid=25988 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:03:59 executing program 1: r0 = open(&(0x7f0000000140)='.\x00', 0x143042, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0xffffffffffffffcc) write$binfmt_elf64(r0, 0x0, 0x0) 14:03:59 executing program 0: r0 = socket$unix(0x1, 0x200000000000001, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = dup(r0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x610a13f0308800cc) gettid() write$P9_RSYMLINK(0xffffffffffffffff, 0x0, 0x200) write$P9_RUNLINKAT(r1, 0x0, 0x0) [ 572.982266] audit: type=1400 audit(1556719437.741:4017): avc: denied { map } for pid=25980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.290098] audit: type=1400 audit(1556719437.751:4018): avc: denied { map } for pid=25980 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 573.707426] audit: type=1400 audit(1556719437.841:4019): avc: denied { map } for pid=25980 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:00 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) [ 574.313423] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:04:00 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x291) r0 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0xfffffffffffffebb) r1 = gettid() write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0xffffffffffffffdb) timer_create(0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x1e0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) tkill(r1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) getegid() timer_create(0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 574.411248] audit: type=1400 audit(1556719437.841:4020): avc: denied { map } for pid=25980 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 574.501853] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:04:01 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f0000000000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="00000000000d00000008000600e10b0000c922efe4cdec4bf53735dacfd993dbca8d356271b6dd007e31b1e4540fbd14e4501f4b5ea9a737e1c78a45ef3939290510a98c133ab0276df5cf63e40f9c8849404411c5cd685c8178c7f858ab57a61f74c5ee00"/115], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:01 executing program 0: r0 = open(&(0x7f0000000140)='.\x00', 0x143042, 0x0) timer_create(0x0, 0x0, 0x0) gettid() write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0xff0d) write$P9_RREADLINK(r0, 0x0, 0x0) [ 575.351240] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:04:02 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd0") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 575.676718] IPVS: ftp: loaded support on port[0] = 21 [ 575.933628] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 576.202188] kauditd_printk_skb: 157 callbacks suppressed [ 576.202197] audit: type=1400 audit(1556719442.721:4115): avc: denied { sys_admin } for pid=26478 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 576.695046] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 577.558915] audit: type=1400 audit(1556719442.961:4117): avc: denied { sys_admin } for pid=26575 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:05 executing program 2: r0 = open(&(0x7f0000000280)='./file0\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x291) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = semget(0x1, 0x3, 0x2) semctl$GETNCNT(r2, 0x4, 0xe, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000180)={0x0, 0xa3}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x7) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0x1, 0x81, "02b726f4941a3a1be2488f14f3ad2ae95b2dc046fea251c850202b6411a49a3c00ab626300dae273ff40c0fa178c09d17d09bed8a43c574ea9695170aca8e98d484f5f647238fafaf92c56da0deeb96b5c06f125dfe64546983ef3204c4df51f5069f825d12e067e40e393d611f18e043e193fcf75060119f0a4b389c4a2798a63"}) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) getegid() tkill(r1, 0x1000000000016) 14:04:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 579.341140] audit: type=1400 audit(1556719442.961:4116): avc: denied { sys_admin } for pid=26326 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 579.516372] audit: audit_backlog=66 > audit_backlog_limit=64 [ 579.516377] audit: audit_backlog=66 > audit_backlog_limit=64 [ 579.516385] audit: audit_lost=669 audit_rate_limit=0 audit_backlog_limit=64 [ 579.525908] audit: audit_backlog=66 > audit_backlog_limit=64 [ 579.554014] audit: audit_backlog=66 > audit_backlog_limit=64 [ 579.554727] audit: audit_backlog=66 > audit_backlog_limit=64 [ 579.559853] audit: audit_lost=670 audit_rate_limit=0 audit_backlog_limit=64 14:04:06 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="430221fa42bd4e206c82a813ef80d7ee"}, 0x1c) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 14:04:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 14:04:07 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="0f01cf6766c74424000b0000006766c7442402050000006766c744240600000000670f0114240f01c8c0b60600820fc75c0066b97e0b00000f320f300f07ba2100b80c00ef8fea7810c600000080", 0x4e}], 0x1, 0x40, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) r7 = msgget$private(0x0, 0x4) r8 = geteuid() fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000500)=0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000540)={0x0, 0x0}) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000580)={{0x2, r8, r9, r10, r11, 0x1a, 0xffffffffffffffe0}, 0x80000001, 0x7, 0x2, 0x1f, 0x8, 0x20, r12, r13}) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 581.215975] kauditd_printk_skb: 390 callbacks suppressed [ 581.215984] audit: type=1400 audit(1556719447.731:4206): avc: denied { map } for pid=27120 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:07 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd0") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 581.842262] audit: type=1400 audit(1556719447.741:4207): avc: denied { map } for pid=27165 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x11) dup3(r0, r1, 0x1000000000) [ 582.484973] audit: type=1400 audit(1556719447.811:4208): avc: denied { map } for pid=27165 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:09 executing program 0: r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0x0, 0x4c48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00], 0x0, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$mice(0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280), 0x10) socket$unix(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x1012, r0, 0x0) perf_event_open(&(0x7f0000000900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x4000000002, 0x10) 14:04:09 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) 14:04:09 executing program 1: [ 582.754885] audit: type=1400 audit(1556719447.911:4209): avc: denied { sys_admin } for pid=27256 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:09 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd0") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 583.052619] audit: type=1400 audit(1556719447.911:4210): avc: denied { sys_admin } for pid=27256 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 583.225078] audit: type=1400 audit(1556719447.941:4211): avc: denied { sys_admin } for pid=27285 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:09 executing program 3: 14:04:09 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(r0, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 583.404270] audit: type=1400 audit(1556719447.981:4212): avc: denied { sys_admin } for pid=27270 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:09 executing program 1: 14:04:10 executing program 2: [ 583.645932] audit: type=1400 audit(1556719448.011:4213): avc: denied { map } for pid=27120 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:10 executing program 0: [ 583.877394] audit: type=1400 audit(1556719448.011:4214): avc: denied { map } for pid=27120 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:10 executing program 3: mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 583.984066] audit: audit_backlog=65 > audit_backlog_limit=64 14:04:10 executing program 1: [ 584.231276] IPVS: ftp: loaded support on port[0] = 21 14:04:10 executing program 2: 14:04:10 executing program 0: 14:04:11 executing program 3: 14:04:11 executing program 1: [ 586.171351] IPVS: ftp: loaded support on port[0] = 21 14:04:13 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:13 executing program 0: 14:04:13 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000380)={0x1}, 0x8) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000280)={0x14, 0xfff, 0xb, 0xc, 0x5, 0x81}) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @bcast, 0x3}, [@null, @bcast, @default, @bcast, @null, @null, @default, @null]}, 0x48) socket$inet6(0xa, 0x4, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/policy\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="d60398870be60a0803ede7b06fff8ac0efe84c9d97578e044a9391b314e35b01000080a7882e0eabd60f5ca2c5a18b8c1b0b67423101b7bb8862", @ANYRES16=r6, @ANYBLOB="000329bd70000000759388c6e29d93166015000019f4ffff07000600e129000089a966d8a3ebf5c3178f38a379457e63f9df14261e97f716a9c0fc735cecc11d21ace7456f674f18550387d6f422454b7ef739852eeb3d9b"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:13 executing program 2: 14:04:13 executing program 1: 14:04:13 executing program 3: 14:04:13 executing program 0: 14:04:13 executing program 3: 14:04:13 executing program 1: 14:04:13 executing program 2: [ 587.184008] kauditd_printk_skb: 137 callbacks suppressed [ 587.184017] audit: type=1400 audit(1556719453.701:4329): avc: denied { create } for pid=27495 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 587.837576] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.837714] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.848192] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.874209] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.880082] audit: audit_lost=780 audit_rate_limit=0 audit_backlog_limit=64 [ 587.881968] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.889835] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.898619] audit: audit_backlog=65 > audit_backlog_limit=64 [ 587.908150] audit: audit_backlog=65 > audit_backlog_limit=64 14:04:14 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:14 executing program 0: 14:04:14 executing program 3: 14:04:14 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1ff, 0x2000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) ioctl$KDDISABIO(r0, 0x4b37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000014c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x748, 0x508, 0x1e8, 0xd8, 0x1e8, 0x5c8, 0x6b0, 0x6b0, 0x6b0, 0x6b0, 0x6b0, 0x6, &(0x7f0000001440), {[{{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x10001, 0xff, 0xffffffff, 'yam0\x00', 'lo\x00', {}, {0xff}, 0x0, 0x2, 0x8}, 0x0, 0x98, 0xd8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x6, 0xffffffff00000001, @ipv4=@rand_addr=0x1, 0x4e20}}}, {{@uncond, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x5}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0xbd, @broadcast, 0x4e20}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0xff0000ff, 0xff, 'veth0_to_team\x00', 'bridge_slave_0\x00', {0xff}, {}, 0x21, 0x2, 0x48}, 0x0, 0x2f0, 0x320, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}, @common=@unspec=@bpf0={0x230, 'bpf\x00', 0x0, {0x3e, [{0x0, 0x7, 0x6, 0x4}, {0x0, 0x101, 0x21c0000, 0x400}, {0x5, 0x200, 0x1f, 0x4}, {0xfffffffffffffffa, 0xfffffffffffffffa, 0x9, 0x5}, {0x7, 0x1, 0x6, 0x61a}, {0x9, 0x3, 0xdd50, 0x7}, {0x1, 0x2bb2, 0xe06, 0x7}, {0x7f, 0x2, 0x0, 0x3}, {0x1, 0x10001, 0x42b, 0xff}, {0xb3b6, 0x3, 0x8, 0x101}, {0x0, 0x8, 0x4, 0x41c59ea6}, {0x1, 0x3c, 0x400000000000000}, {0x7fff, 0x100000000, 0x5, 0xffffffff}, {0x6, 0x6, 0xe98, 0x6}, {0x1, 0x56, 0xe0dc, 0x1}, {0x7, 0x5, 0xfff, 0x9}, {0x1, 0xb3, 0x100, 0x7}, {0xe5, 0x101, 0x3, 0x7fffffff}, {0xfff, 0x3, 0x1, 0x81}, {0xb8a, 0x3, 0x7, 0x7}, {0x158000000000000, 0x7, 0x5, 0x8}, {0x3d, 0x4, 0x2, 0x2}, {0x4, 0xfffffffffffffffd, 0xffffffff, 0x7ff}, {0x86, 0x80000000, 0x6, 0x7f}, {0x6, 0x8001, 0x81, 0x3}, {0x5, 0x3f3, 0x8, 0x40}, {0x4, 0xffffffffffffffff, 0xfffffffffffffffc, 0x6db}, {0x3, 0x7, 0xce0, 0x8001}, {0x9, 0x20, 0x77f7, 0x8}, {0x20, 0x0, 0x1ff, 0x8000}, {0x5, 0x668, 0x4, 0xa76}, {0xfffffffffffff000, 0x7, 0x0, 0x8}, {0xff, 0x800, 0x8}, {0x5, 0x6, 0xfff, 0x89}, {0x6, 0x80000001, 0x7, 0x6}, {0x2, 0x10000, 0x7, 0xfff}, {0x5, 0x0, 0x7, 0x6f58}, {0x1, 0xfffffffffffffffe, 0x2, 0x7}, {0x4, 0x1, 0x4, 0x3}, {0x6e70, 0x81, 0x5, 0x1}, {0x4, 0x1, 0xf17, 0x400}, {0x101, 0x1f, 0x7, 0x4}, {0x54e8, 0x40, 0xffff, 0x1}, {0xd3, 0xad, 0x1, 0x2}, {0x3, 0xfff, 0x7, 0x7}, {0x7ff, 0x1, 0x1}, {0x9a13, 0x4, 0x100000001, 0x7fffffff}, {0x9, 0x1, 0x1, 0x8}, {0x17, 0x1, 0x7, 0x1000}, {0x3, 0x100, 0xf493, 0xf4}, {0x9, 0x80000000, 0x5588df2, 0x9254}, {0x4, 0xffffffffffffffe1, 0x100000001, 0x1}, {0x6, 0x10001, 0x1f, 0xffffffff}, {0x93e7, 0xf5a, 0x9, 0x1f}, {0x8, 0x8, 0x4, 0x6}, {0x3, 0x3, 0x0, 0xfffffffffffffeff}, {0x200, 0xc4e5, 0x1, 0x9}, {0x1, 0x1, 0x8, 0x8}, {0x1, 0x3, 0xf992}, {0x1adf, 0xe0, 0x8, 0x15a}, {0xffffffff, 0x6, 0xb0f, 0xff}, {0x101, 0x8001, 0x8, 0x3}, {0x863, 0x582, 0x287f, 0x80000001}, {0x92, 0x467, 0xffff, 0x7}], 0x6}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x6, 0x7, @broadcast, 0x4e23}}}, {{@ip={@multicast2, @multicast1, 0xffffffff, 0xffffffff, 'syz_tun\x00', 'caif0\x00', {0xff}, {}, 0x67, 0x2, 0x22}, 0x0, 0x98, 0xc0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x38}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x7a8) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4(r2, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x5) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000040)=0x2d, &(0x7f00000000c0)=0x1) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x4002, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) getsockopt$bt_hci(r3, 0x0, 0x2, &(0x7f0000000380)=""/4096, &(0x7f0000000140)=0x1000) getsockname$packet(r4, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) syz_open_dev$sndtimer(&(0x7f0000001400)='/dev/snd/timer\x00', 0x0, 0x8000) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1ce475fb", @ANYRES16=r6, @ANYBLOB="0003e9b05d29bd7000002000000d0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) ioctl$NBD_SET_FLAGS(r4, 0xab0a, 0xffffffff) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000013c0)=0xc) fcntl$setownex(r5, 0xf, &(0x7f0000001c80)={0x2, r7}) 14:04:15 executing program 1: 14:04:15 executing program 2: 14:04:15 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(0x0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:15 executing program 3: 14:04:15 executing program 0: 14:04:15 executing program 1: 14:04:15 executing program 2: 14:04:16 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:16 executing program 3: 14:04:16 executing program 0: 14:04:16 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = shmget(0x3, 0x1000, 0x40, &(0x7f0000ffc000/0x1000)=nil) r3 = geteuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r6 = getegid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x1, &(0x7f00000001c0)='\x00', 0xffffffffffffffff}, 0x30) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000400)={{0x3, r3, r4, r5, r6, 0x49}, 0x9, 0x7ff, 0x3, 0x3ff, r7, r8, 0x3}) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) r10 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r11 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r9, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r10) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r12 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r11, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r12, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:16 executing program 1: 14:04:16 executing program 2: [ 590.073333] IPVS: ftp: loaded support on port[0] = 21 14:04:16 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:16 executing program 0: 14:04:16 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x4800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:16 executing program 3: 14:04:16 executing program 1: 14:04:17 executing program 2: 14:04:17 executing program 0: 14:04:17 executing program 1: 14:04:17 executing program 3: 14:04:18 executing program 0: 14:04:18 executing program 2: 14:04:18 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:18 executing program 1: 14:04:18 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x440, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x70e, @mcast2, 0x9f67}], 0x2c) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0), 0x4c664329aabf2fa3) close(r2) ioctl$KVM_NMI(r0, 0xae9a) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r5, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f00000000c0)={0x9, 0x0, 0x401, 0x20, 0x3ff, "4e81ed26f2c647dbae4908447a57633121dbea", 0x1, 0x80}) 14:04:18 executing program 3: [ 592.199467] kauditd_printk_skb: 516 callbacks suppressed [ 592.199476] audit: type=1400 audit(1556719458.711:4546): avc: denied { sys_admin } for pid=27767 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.574819] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.575729] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.580689] audit: audit_lost=884 audit_rate_limit=0 audit_backlog_limit=64 [ 592.597837] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.606128] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.606862] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.612721] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.637180] audit: audit_backlog=65 > audit_backlog_limit=64 [ 592.638194] audit: audit_backlog=65 > audit_backlog_limit=64 14:04:19 executing program 0: 14:04:19 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:19 executing program 1: 14:04:19 executing program 2: 14:04:19 executing program 3: 14:04:20 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:20 executing program 0: [ 593.541763] IPVS: ftp: loaded support on port[0] = 21 14:04:20 executing program 1: 14:04:20 executing program 3: 14:04:20 executing program 2: 14:04:20 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x67ffd, 0x0) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000000)={0xa690, "8b60b669483f663bb3c292cbefd34e68d760e373989e13f8d034ba5677614c1a", 0x7, 0x0, 0xffffffffffff7fff, 0x101, 0x16, 0x4, 0x8, 0x2}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="b7a40000", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:20 executing program 0: 14:04:20 executing program 1: 14:04:20 executing program 3: 14:04:21 executing program 2: 14:04:21 executing program 0: 14:04:21 executing program 1: 14:04:21 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:21 executing program 3: 14:04:21 executing program 2: 14:04:21 executing program 0: 14:04:21 executing program 1: 14:04:22 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000000)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xfffffffffffffe4f, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x300, 0x70bd2b}, 0xffffffffffffff47}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:22 executing program 3: 14:04:22 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, 0x0) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 595.681319] IPVS: ftp: loaded support on port[0] = 21 14:04:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r4, 0x4004ae8b, &(0x7f0000000040)) 14:04:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x10000000010a, 0x80000000000003, 0x800000000007}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040)="1068ab2def0cb25cc3b956ff1c50060c1e66b9c494bc35d48732f633cf7d9fc248fc8510d9f413d48c57f564e8530b5f4bdf12a9b39e8985e835ad02f340708a1d275ce0823293f506c502653a9f53751a99538b9c89e6c79fb4e586e7fbc8409c465f310fbac379f2a4458e259f8db9839e03e1cb94fac30bdfb7c573150d627e2263eafad3af77bdf0d264ab5b07235682ec8d3dcc56566943a247d57b4ac8e870b57635d4bf265c0d66302444105ab624bfdc2ca25711666e90701292921b71", 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x81fffe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) 14:04:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x4) 14:04:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) 14:04:23 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x67ffd, 0x0) ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000000)={0xa690, "8b60b669483f663bb3c292cbefd34e68d760e373989e13f8d034ba5677614c1a", 0x7, 0x0, 0xffffffffffff7fff, 0x101, 0x16, 0x4, 0x8, 0x2}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="b7a40000", @ANYRES16=r5, @ANYBLOB="000329bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:23 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000380)={0x1}, 0x8) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000280)={0x14, 0xfff, 0xb, 0xc, 0x5, 0x81}) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @bcast, 0x3}, [@null, @bcast, @default, @bcast, @null, @null, @default, @null]}, 0x48) socket$inet6(0xa, 0x4, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/policy\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="d60398870be60a0803ede7b06fff8ac0efe84c9d97578e044a9391b314e35b01000080a7882e0eabd60f5ca2c5a18b8c1b0b67423101b7bb8862", @ANYRES16=r6, @ANYBLOB="000329bd70000000759388c6e29d93166015000019f4ffff07000600e129000089a966d8a3ebf5c3178f38a379457e63f9df14261e97f716a9c0fc735cecc11d21ace7456f674f18550387d6f422454b7ef739852eeb3d9b"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:23 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:23 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:04:23 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = getuid() syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x3, &(0x7f00000014c0)=[{&(0x7f0000000380)="c31d3e872c21c89818d646ce322fa7c973e526cde09f1d8ac80675298c407f59238df1a97a53077c3fa58979667cf2ee2962e22107ddb057a1dc52c24707cdcb650d619c29b2c6882253a70646", 0x4d, 0x4}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="7230dac4db651c0263919712bfe11089db7a796493db025b37fde1d00441eb05863ad8190c3c62fad6077c5b9594097f3542b641b34f515ca634d5c286845907f5b9444df945cfd0ba9a781ce4675dfff24a493c6aa226a41806010dea5138748da8784e207d9d43192d201e2c91b780ccb9dcfbe2353e3d170fd403cb9003b6a2", 0x81, 0x3ff}], 0x80000, &(0x7f0000001540)={[{@nobarrier='nobarrier'}, {@quota='quota'}, {@ignore_local_fs='ignore_local_fs'}, {@data_writeback='data=writeback'}], [{@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@hash='hash'}, {@euid_lt={'euid<', r1}}, {@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x77, 0x77, 0x77, 0x7f, 0x34, 0x3f, 0x37], 0x2d, [0x36, 0x64, 0x64, 0x31], 0x2d, [0x36, 0x30, 0x35, 0x35], 0x2d, [0x36, 0x65, 0x7d, 0x7a], 0x2d, [0x37, 0x75, 0x76, 0x37, 0x77, 0x38, 0x36, 0x71]}}}, {@obj_type={'obj_type', 0x3d, '/dev/vfio/vfio\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted&\\\\-vmnet1*%*{'}}]}) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000005000/0x4000)=nil, 0x4000) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000005000/0x2000)=nil) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r6, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 597.272088] kauditd_printk_skb: 299 callbacks suppressed [ 597.272097] audit: type=1400 audit(1556719463.791:4746): avc: denied { map } for pid=27941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 597.544619] audit: type=1400 audit(1556719463.811:4747): avc: denied { map } for pid=27941 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 597.687530] audit: type=1400 audit(1556719463.811:4748): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.004823] audit: type=1400 audit(1556719463.831:4749): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:24 executing program 3: 14:04:24 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000040)={0xa, 0x4, 0x2, 0x80000000, '\x00', 0x1000}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3, 0x1, 0x6, 0x100000000}, {0x1, 0x32, 0x0, 0x80000000}]}, 0x10) preadv(r2, &(0x7f0000000140), 0x391, 0x51) [ 598.316491] audit: type=1400 audit(1556719463.891:4750): avc: denied { map } for pid=27941 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.461608] IPVS: ftp: loaded support on port[0] = 21 [ 598.544973] audit: type=1400 audit(1556719463.921:4751): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.739205] audit: audit_backlog=65 > audit_backlog_limit=64 [ 598.780417] audit: type=1400 audit(1556719463.921:4752): avc: denied { map } for pid=27941 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 598.785608] audit: audit_lost=920 audit_rate_limit=0 audit_backlog_limit=64 [ 598.915956] audit: audit_backlog=65 > audit_backlog_limit=64 14:04:25 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, 0x0) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:25 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) r0 = socket(0x200000, 0x800000000000003, 0x2) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_data=&(0x7f00000000c0)="a325d3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) 14:04:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x14, r1, 0x238}, 0x14}}, 0x0) 14:04:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x541000) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000100)=0x92, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040)=0x6, 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:04:25 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x15c, @ipv4={[], [], @local}, 0x40}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r6}}, 0x18) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r7, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x80) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100, 0x121080) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000080)) 14:04:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') syz_open_dev$sndctrl(&(0x7f00000002c0)='/dev/snd/controlC#\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400)={0x0, 0x1c9c380}, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x858}], 0x1) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) 14:04:26 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x4, &(0x7f0000000400)) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) socket$inet6(0xa, 0x4, 0xfffffffffffffffb) accept4$rose(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x800) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000001c0)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = dup(r1) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000000)={{0xaf, @rand_addr=0x7, 0x4e24, 0x3, 'rr\x00', 0x8, 0x13ac6416, 0xa}, {@remote, 0x4e21, 0x2002, 0x0, 0x5, 0x7fffffff}}, 0x44) 14:04:26 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, 0x0) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x430100, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x7, 0x2, 0x1, 0xffffffff, 0x1476, 0x5}, 0xff, 0x100000001}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:04:26 executing program 1: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@rose, @default, @remote, @netrom, @netrom, @rose, @null, @default]}, &(0x7f00000000c0)=0x48, 0x80000) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'ip6_vti0\x00', {0x2, 0x4e24, @loopback}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket(0x1e, 0x2, 0x0) r3 = socket(0x800000000000001e, 0x200000000000002, 0x0) bind(r3, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r2, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) sendmsg(r3, &(0x7f0000000700)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 14:04:26 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @dev={0xac, 0x14, 0x14, 0x1d}, @dev}, 0xc) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x6, 0x410000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x3ff, 0xce27}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r3, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x8040) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000080)) 14:04:27 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x42, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x100000000, 0x4}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x5}, 0x8) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) getegid() 14:04:27 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4000000000, 0x400000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="34010000", @ANYRES16=r1, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x1}, 0x4800) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x100000000, @loopback, 0x3}, @in6={0xa, 0x4e24, 0x9, @remote, 0x9}, @in6={0xa, 0x4e22, 0x4, @rand_addr="763c58056932928858ae413d69ab1779", 0x1}, @in6={0xa, 0x4e24, 0x10000, @empty, 0x629}, @in6={0xa, 0x4e24, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, @in={0x2, 0x4e24, @loopback}], 0x9c) 14:04:27 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x9, 0x2200) openat$cgroup_int(r2, &(0x7f0000000300)='cpuset.mem_exclusive\x00', 0x2, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0xffffffffffffffe0) ioctl$NBD_DO_IT(r1, 0xab03) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x400801) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="5421f19bdd4f3d34786a736858f1cc71947cf2429a465acaed5cbeb092ef7b3087b979019b8ce509767635778f96f8c05828e53037f213bbfebc82b97d26685fe925f58943a2a1b67376768bff09a506115e7c2935b6a2c0012f2061fe47a5a956e3118236f801672f71", 0x6a, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r5, 0x0, 0x401}, &(0x7f00000001c0)=ANY=[@ANYBLOB="656e633d706b63733120686173683d7368613338340000000000000000000000000000000000000000000000000000000000001000"/79], &(0x7f0000000240)="171c966e6226d82a69020cb933e01977fa38fc1470672a69a4440e", &(0x7f0000000280)="65e0194221") 14:04:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x283, 0x3}) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) syz_genetlink_get_family_id$ipvs(0x0) 14:04:27 executing program 2: r0 = socket$inet(0x11, 0x2, 0x0) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000040)=@isdn={0x22, 0x0, 0x0, 0x5}, 0x80, 0x0}, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101801, 0x0) 14:04:27 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:27 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x210000, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000100)={0x8, 0x3ff80000000, 0x9, 0x1}, 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x0, @loopback}, {0x2, 0x4e21, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) getpeername$unix(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) 14:04:27 executing program 1: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RRENAME(r0, &(0x7f0000000080)={0xfffffffffffffeb0}, 0x7) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x5) fcntl$setpipe(r0, 0x407, 0x0) fcntl$setpipe(r0, 0x407, 0x0) 14:04:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000100)) getsockname$llc(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 14:04:28 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101100, 0x0) ioctl$TIOCEXCL(r0, 0x540c) r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x11d2, 0x40000) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)) 14:04:28 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0xffffffffffffffff, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 602.301579] kauditd_printk_skb: 144 callbacks suppressed [ 602.301588] audit: type=1400 audit(1556719468.821:4885): avc: denied { map } for pid=28053 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.448242] audit: type=1400 audit(1556719468.861:4886): avc: denied { map } for pid=28053 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:29 executing program 3: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:04:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x4001, @loopback={0xf00000000000000}}]}}}]}, 0x48}}, 0x0) ioctl$int_in(r0, 0xa245f9e237f83bcb, &(0x7f0000000000)=0x80000100) [ 602.641171] audit: type=1400 audit(1556719468.871:4887): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 602.742026] audit: type=1400 audit(1556719468.881:4888): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:04:29 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@loopback, @multicast2}, &(0x7f0000000040)=0xc) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000140)=0xc) [ 602.961161] audit: type=1400 audit(1556719468.921:4889): avc: denied { map } for pid=28053 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.081194] audit: type=1400 audit(1556719468.951:4890): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.209400] audit: type=1400 audit(1556719468.951:4891): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.348168] audit: type=1400 audit(1556719468.991:4892): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.505454] audit: type=1400 audit(1556719469.001:4893): avc: denied { map } for pid=28053 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 603.691108] audit: type=1400 audit(1556719469.011:4894): avc: denied { set_context_mgr } for pid=28054 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 605.691377] IPVS: ftp: loaded support on port[0] = 21 [ 611.841285] IPVS: ftp: loaded support on port[0] = 21 [ 614.004514] kauditd_printk_skb: 58 callbacks suppressed [ 614.004522] audit: type=1400 audit(1556719480.521:4953): avc: denied { sys_admin } for pid=28110 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 614.492727] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.494115] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.498594] audit: audit_lost=925 audit_rate_limit=0 audit_backlog_limit=64 [ 614.510548] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.526659] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.530911] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.538550] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.539951] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.552958] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.051378] IPVS: ftp: loaded support on port[0] = 21 14:04:46 executing program 0: [ 620.218168] kauditd_printk_skb: 264 callbacks suppressed [ 620.218176] audit: type=1400 audit(1556719486.731:5137): avc: denied { sys_admin } for pid=28515 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:46 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000200)={0x6, 0x8, 0x4, 0x2000000, {}, {0x5, 0xd, 0x1f, 0x0, 0xfffffffffffffff9, 0xa9a9, "cce2348f"}, 0x5, 0x3, @offset=0x3, 0x4}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) creat(0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000040)={0x9, 0x7fff, 0x9, 0x7f, 0xff, 0x1f, 0x1, 0x1}, &(0x7f0000000080)={0x80000000, 0x7f, 0x483, 0xf8a4, 0x7a42, 0x7, 0xdcb, 0x20}, &(0x7f00000000c0)={0x4, 0xfffffffffffffbff, 0xcf, 0x8, 0x8a, 0x2, 0x4, 0x6}, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1}, 0x8}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x28052, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) 14:04:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x200) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8008140}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000400000fcfe00d63969c375ddbed10000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0xffffffffffffff28) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:04:46 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x3}) 14:04:46 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f0000000380)=""/179) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000329bd7000000000000d00000108000628d7c58b00"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:46 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:04:47 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, r0, 0x0, 0x0) [ 620.871224] audit: type=1400 audit(1556719486.731:5138): avc: denied { sys_admin } for pid=28515 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:47 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000440)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x4c, 0x0, &(0x7f0000000380)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 14:04:47 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x4000) 14:04:47 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) unshare(0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 621.391314] audit: type=1400 audit(1556719486.741:5139): avc: denied { sys_admin } for pid=28518 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:04:48 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x10000000300ffe, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0xe4, r7, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8ef}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x800}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40}, 0x20000011) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r6) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) write$P9_RREAD(r5, &(0x7f0000000200)={0xe, 0x75, 0x2, {0x3, "f36b1f"}}, 0xe) r8 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r8, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00\x00'], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:04:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x480000) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, {0x2, 0x4e21, @local}, 0x48, 0x0, 0x0, 0x0, 0x31, &(0x7f0000000040)='yam0\x00', 0xffffffffffffff56, 0x401, 0x1f}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) [ 621.647268] audit: type=1400 audit(1556719486.741:5140): avc: denied { sys_admin } for pid=28518 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 621.870384] audit: type=1400 audit(1556719486.751:5141): avc: denied { sys_admin } for pid=28522 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 621.948674] audit: audit_backlog=65 > audit_backlog_limit=64 [ 621.982600] binder: 28665:28668 transaction failed 29189/-22, size 0-0 line 2802 [ 621.988521] audit: audit_lost=955 audit_rate_limit=0 audit_backlog_limit=64 [ 622.066510] binder: undelivered TRANSACTION_ERROR: 29189 [ 622.069565] audit: backlog limit exceeded [ 622.077346] binder: 28665:28670 transaction failed 29189/-22, size 0-0 line 2802 [ 622.096575] audit: type=1400 audit(1556719486.751:5142): avc: denied { sys_admin } for pid=28522 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.124472] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 622.139320] binder: undelivered TRANSACTION_ERROR: 29189 [ 622.180798] audit: audit_backlog=65 > audit_backlog_limit=64 [ 623.536013] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 627.761457] IPVS: ftp: loaded support on port[0] = 21 [ 628.604046] kauditd_printk_skb: 135 callbacks suppressed [ 628.604066] audit: type=1400 audit(1556719495.121:5255): avc: denied { sys_admin } for pid=28718 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 628.811168] audit: type=1400 audit(1556719495.181:5256): avc: denied { sys_admin } for pid=28718 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 629.341149] audit: type=1400 audit(1556719495.851:5257): avc: denied { sys_admin } for pid=28793 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 629.561998] audit: type=1400 audit(1556719495.871:5258): avc: denied { sys_admin } for pid=28793 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 630.061943] audit: type=1400 audit(1556719495.901:5259): avc: denied { sys_admin } for pid=28818 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 630.271145] audit: type=1400 audit(1556719495.901:5260): avc: denied { sys_admin } for pid=28818 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 630.729030] audit: type=1400 audit(1556719495.911:5261): avc: denied { sys_admin } for pid=28819 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 630.890945] audit: type=1400 audit(1556719495.911:5262): avc: denied { sys_admin } for pid=28819 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 631.973645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 631.979481] audit: audit_lost=964 audit_rate_limit=0 audit_backlog_limit=64 [ 632.661484] IPVS: ftp: loaded support on port[0] = 21 [ 633.615188] kauditd_printk_skb: 126 callbacks suppressed [ 633.615196] audit: type=1400 audit(1556719500.131:5388): avc: denied { sys_admin } for pid=29486 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 633.841219] audit: type=1400 audit(1556719500.171:5389): avc: denied { sys_admin } for pid=29488 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 633.954173] audit: type=1400 audit(1556719500.171:5390): avc: denied { sys_admin } for pid=29488 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 634.031149] audit: type=1400 audit(1556719500.171:5391): avc: denied { sys_admin } for pid=29486 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 634.165750] audit: type=1400 audit(1556719500.181:5392): avc: denied { sys_admin } for pid=29490 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 634.383300] audit: type=1400 audit(1556719500.181:5393): avc: denied { sys_admin } for pid=29490 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 634.533742] audit: type=1400 audit(1556719500.191:5394): avc: denied { sys_admin } for pid=29489 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 634.764297] audit: type=1400 audit(1556719500.191:5395): avc: denied { sys_admin } for pid=29489 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 635.204407] audit: type=1400 audit(1556719500.191:5396): avc: denied { sys_admin } for pid=29487 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 635.306392] audit: audit_backlog=65 > audit_backlog_limit=64 [ 638.241556] IPVS: ftp: loaded support on port[0] = 21 [ 639.302869] kauditd_printk_skb: 106 callbacks suppressed [ 639.302878] audit: type=1400 audit(1556719505.821:5489): avc: denied { setgid } for pid=29691 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 640.171330] IPVS: ftp: loaded support on port[0] = 21 14:05:08 executing program 0: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000200)="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") 14:05:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) 14:05:08 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:05:08 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) accept$netrom(r0, &(0x7f0000000000)={{0x3, @null}, [@remote, @netrom, @netrom, @remote, @rose, @rose, @default, @default]}, &(0x7f00000000c0)=0x48) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x0, 0x0) r5 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_CREATE_DEVICE(r6, 0xc00caee0, &(0x7f00000001c0)={0x6, r4, 0x1}) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="000329b57000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:05:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6, 0x0, 0x2, 0x46a}) socket$inet_udp(0x2, 0x2, 0x0) 14:05:08 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) 14:05:08 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) [ 642.395161] audit: type=1400 audit(1556719508.911:5490): avc: denied { map } for pid=29741 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.440958] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 642.488948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 642.509959] audit: type=1400 audit(1556719508.941:5491): avc: denied { map } for pid=29741 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.651338] audit: type=1400 audit(1556719508.951:5492): avc: denied { map } for pid=29741 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:05:09 executing program 3: getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x3f, 0x0, 0x3, 0x2, 0x9, 0x5, 0x10001, {0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0x347}}, 0x80000001, 0x2180, 0x1, 0x0, 0x1}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x80000001, 0x5}, &(0x7f0000000200)=0x90) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4400, 0xe3) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r1, 0x7, 0x8, 0x8cb}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={r0, 0x1, 0x7fff, 0x3, 0x7, 0x7, 0x80, 0x6, {r1, @in6={{0xa, 0x4e21, 0x9, @ipv4={[], [], @broadcast}, 0x2}}, 0x100, 0x0, 0x84c, 0x8, 0x7fffffff}}, &(0x7f0000000240)=0xb0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:05:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) [ 642.854327] audit: type=1400 audit(1556719508.961:5493): avc: denied { map } for pid=29741 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:05:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) ioctl$KVM_GET_PIT(r1, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x8000) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001, 0x7004], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:05:09 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 643.152887] audit: type=1400 audit(1556719508.981:5494): avc: denied { create } for pid=29729 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:05:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000000}) [ 643.482716] audit: type=1400 audit(1556719508.991:5495): avc: denied { write } for pid=29729 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 643.884443] audit: type=1400 audit(1556719509.001:5496): avc: denied { map } for pid=29741 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.979218] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.063313] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.313813] audit_log_start: 38 callbacks suppressed [ 644.313818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.332939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.373220] audit: type=1400 audit(1556719509.051:5497): avc: denied { map } for pid=29741 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 644.398786] audit: audit_lost=983 audit_rate_limit=0 audit_backlog_limit=64 [ 644.424162] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.430011] audit: audit_lost=984 audit_rate_limit=0 audit_backlog_limit=64 [ 644.443453] audit: audit_backlog=65 > audit_backlog_limit=64 [ 644.449284] audit: audit_lost=985 audit_rate_limit=0 audit_backlog_limit=64 [ 644.482652] audit: audit_lost=986 audit_rate_limit=0 audit_backlog_limit=64 [ 644.523134] audit: backlog limit exceeded [ 645.141350] protocol 88fb is buggy, dev hsr_slave_0 [ 645.146508] protocol 88fb is buggy, dev hsr_slave_1 [ 645.701175] protocol 88fb is buggy, dev hsr_slave_0 [ 645.706291] protocol 88fb is buggy, dev hsr_slave_1 [ 656.061277] IPVS: ftp: loaded support on port[0] = 21 [ 656.849615] kauditd_printk_skb: 127 callbacks suppressed [ 656.849623] audit: type=1400 audit(1556719523.361:5609): avc: denied { sys_admin } for pid=29947 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.155705] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.156720] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.162597] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.173628] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.179472] audit: audit_lost=992 audit_rate_limit=0 audit_backlog_limit=64 [ 657.187853] audit: type=1400 audit(1556719523.361:5608): avc: denied { sys_admin } for pid=29935 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.195276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 657.222766] audit: audit_lost=993 audit_rate_limit=0 audit_backlog_limit=64 [ 657.223624] audit: audit_backlog=65 > audit_backlog_limit=64 [ 659.372164] IPVS: ftp: loaded support on port[0] = 21 [ 660.261187] protocol 88fb is buggy, dev hsr_slave_0 [ 660.266320] protocol 88fb is buggy, dev hsr_slave_1 [ 660.341164] protocol 88fb is buggy, dev hsr_slave_0 [ 660.346274] protocol 88fb is buggy, dev hsr_slave_1 [ 660.351426] protocol 88fb is buggy, dev hsr_slave_0 [ 660.356501] protocol 88fb is buggy, dev hsr_slave_1 [ 660.581255] protocol 88fb is buggy, dev hsr_slave_0 [ 660.586370] protocol 88fb is buggy, dev hsr_slave_1 [ 661.111382] IPVS: ftp: loaded support on port[0] = 21 [ 661.221145] protocol 88fb is buggy, dev hsr_slave_0 [ 661.226274] protocol 88fb is buggy, dev hsr_slave_1 [ 661.954173] kauditd_printk_skb: 88 callbacks suppressed [ 661.954182] audit: type=1400 audit(1556719528.471:5679): avc: denied { setgid } for pid=30005 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.171320] audit: type=1400 audit(1556719528.471:5680): avc: denied { setgid } for pid=30005 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.391109] audit: type=1400 audit(1556719528.531:5681): avc: denied { setgid } for pid=30011 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.451202] audit: type=1400 audit(1556719528.571:5682): avc: denied { setgid } for pid=30009 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.524496] audit: type=1400 audit(1556719528.591:5683): avc: denied { setgid } for pid=30011 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.621288] audit: type=1400 audit(1556719528.601:5684): avc: denied { sys_admin } for pid=30021 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.681977] audit: type=1400 audit(1556719528.601:5685): avc: denied { sys_admin } for pid=30021 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.776004] audit: type=1400 audit(1556719528.611:5686): avc: denied { setgid } for pid=30019 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.831150] audit: type=1400 audit(1556719528.631:5687): avc: denied { sys_admin } for pid=30022 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.883186] audit: type=1400 audit(1556719528.631:5688): avc: denied { sys_admin } for pid=30022 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.113766] IPVS: ftp: loaded support on port[0] = 21 [ 665.381397] IPVS: ftp: loaded support on port[0] = 21 14:05:33 executing program 0: 14:05:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) 14:05:33 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) [ 667.225160] kauditd_printk_skb: 58 callbacks suppressed [ 667.225168] audit: type=1400 audit(1556719533.741:5747): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:05:33 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x240100, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast1, 0x4e23, 0x1, 'sh\x00', 0x29, 0x2, 0x2f}, 0x2c) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x24000) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x7) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:05:33 executing program 2: 14:05:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x4, 0x8010000000000084) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000480)=""/244) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 667.328655] audit: type=1400 audit(1556719533.791:5748): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:05:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x446481, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000300)={{0x3, 0x0, 0x20, 0x8, '\x00', 0x1}, 0x1, [0x9, 0x81, 0x1ff, 0x81, 0x8001, 0xfffffffffffffffe, 0x2, 0xfffffffffffffffb, 0x9, 0x2, 0x1, 0x0, 0x1, 0x1ff, 0x6, 0x200, 0x1f, 0xffffffffffffffff, 0xfffffffffffffffa, 0x2, 0x8000, 0x8, 0xb2f, 0x3ff, 0x4, 0x9, 0x4, 0xfffffffffffff3e6, 0x1, 0xff, 0xfffffffffffffff8, 0x1, 0x224, 0x1, 0x80000001, 0x1, 0xf9a, 0xfffffffffffffffb, 0x5d00000000, 0x7f, 0x40, 0x6, 0xcba, 0x5, 0x100, 0x8, 0x0, 0x2, 0x1, 0xfffffffffffffffc, 0x8a1c, 0x61, 0x6, 0xfffffffffffffeff, 0xfff, 0x3, 0x3c, 0x6, 0x0, 0x2, 0x0, 0x3, 0x80000001, 0x542, 0x3, 0x90000000, 0x1, 0x400, 0x8, 0x100000001, 0x169, 0xffffffff, 0x8, 0x2, 0x6, 0x5, 0x8, 0x1f, 0xfffffffffffff162, 0x400, 0x8, 0x6, 0x5, 0x4, 0x7, 0x4, 0x1000, 0x3, 0x6, 0xfd, 0x2, 0x71, 0x8, 0xcb, 0x9, 0x42, 0x100000001, 0x8, 0x6, 0x8000, 0x40, 0xfffffffffffffffd, 0x4, 0x800, 0x40000000000000, 0x0, 0x3, 0xa3bc, 0x9, 0x3ff, 0x1f, 0x10000, 0x6728, 0xfffffffffffffffc, 0x9, 0x8, 0x80000000, 0x101, 0x7f, 0x8, 0x3bc, 0x1, 0x8000, 0xe22, 0x80, 0x5], {0x0, 0x1c9c380}}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) prctl$PR_SET_SECUREBITS(0x1c, 0x2) [ 667.561769] audit: type=1400 audit(1556719534.081:5749): avc: denied { map } for pid=30376 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 667.603113] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:05:34 executing program 2: [ 667.684872] audit: type=1400 audit(1556719534.081:5750): avc: denied { create } for pid=30362 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:05:34 executing program 1: [ 667.888057] audit: type=1400 audit(1556719534.081:5751): avc: denied { map } for pid=30374 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.004605] audit: type=1400 audit(1556719534.101:5752): avc: denied { map } for pid=30374 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:05:34 executing program 4: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, 0x0, 0x0, 0x0) [ 668.201138] audit: type=1400 audit(1556719534.111:5753): avc: denied { map } for pid=30376 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:05:34 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x144456d42c8355cb, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@subj_type={'subj_type'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vfio/vfio\x00'}}, {@euid_lt={'euid<', 0xee00}}]}}) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r7 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r7, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 668.455632] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.459755] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.470988] audit: audit_backlog=65 > audit_backlog_limit=64 14:05:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @local}, 0x6, 0x0, 0x2, 0x46a}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="1c000000c4a81f8a35b8c26fc053de079a268c9a866a462b6fc49d71dadf51bd90923beb81abde72ea7fbbd4ea95570075db8b2306db2bbb607b8b558932a25774204970a692e487b0025db9866b78abe646021246cca6c6a026f3ae562328862dc740c042ad466155bbba2d5ca63ac01784ec9680facedf16dc934a0d21c13fe5d7073a1a0b58b97ff80f06312cd3ad1b4147736a36cd8a5aa9eda6cb258c4b918e61fbc938572ec303c1c677daf0c8ae34482abcaca45e8d2bfa0086219578959c9834077a191623db9e6b34b398f86b9bc8d6a9ef8739bcc47d5c943f77428ed73237326d99ba7bb566fdf69009e21fdf3f2f89"], &(0x7f0000000080)=0x24) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x0, 0x7fffffff, 0x6, 0x3f, 0x9}, 0x14) [ 669.161288] IPVS: ftp: loaded support on port[0] = 21 [ 672.881281] IPVS: ftp: loaded support on port[0] = 21 [ 675.311368] IPVS: ftp: loaded support on port[0] = 21 [ 676.324752] kauditd_printk_skb: 129 callbacks suppressed [ 676.324761] audit: type=1400 audit(1556719542.841:5877): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.421866] audit: type=1400 audit(1556719542.891:5878): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.491114] audit: type=1400 audit(1556719542.961:5879): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.561336] audit: type=1400 audit(1556719543.041:5880): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.631605] audit: type=1400 audit(1556719543.051:5881): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.701133] audit: type=1400 audit(1556719543.061:5882): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.771144] audit: type=1400 audit(1556719543.081:5883): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.841671] audit: type=1400 audit(1556719543.121:5884): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.921239] audit: type=1400 audit(1556719543.151:5885): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 676.977378] IPVS: ftp: loaded support on port[0] = 21 [ 677.001102] audit: type=1400 audit(1556719543.171:5886): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 678.362269] IPVS: ftp: loaded support on port[0] = 21 [ 679.821471] IPVS: ftp: loaded support on port[0] = 21 [ 681.371383] IPVS: ftp: loaded support on port[0] = 21 [ 683.031291] IPVS: ftp: loaded support on port[0] = 21 14:05:50 executing program 0: r0 = gettid() ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000fc0)=@broute={'broute\x00', 0x20, 0x4, 0xe1c, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, &(0x7f0000000100), &(0x7f0000001080)=ANY=[@ANYBLOB="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"]}, 0xe94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x22d) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x1000000000016) 14:05:50 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:05:50 executing program 1: 14:05:50 executing program 2: 14:05:50 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 14:05:50 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000000)=0x101) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x2, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[@ANYBLOB="1e000840", @ANYRES16=r5, @ANYBLOB="000301800000000000000d00000008000600e10b0000657c88a2d8b2eab000f739b4532d157730294787cdbfe353e2379c564e4d7904aae4b5745f29c2f600eb76f44ba74efcbd0b83e5781308901e534b1112d6404583809abde8d2eea01d5f22b4a37511eecc95c9de4f02581490d87433586c12de0bef4cb1e3904f07381adf1bb935e47e1c66206c3e2fbd44368384e01eea2fbda1fabb2e79187f631a660018cb361394ed13a7c7838044c6005a73bbf59fc12a230fc488528b218042b366ac3995521b1cf265ae43e4df89fee743b9a12af5b24fdb9029a0f80000000000b22cae6dc86b6562c05e11af5c5d4693ef35da53a3053dcd46cf3bb4b317e79760a042d0af402c807805cc7240ed1300000000000000004158f82ad4d89e616a56024b844d401391554f5a31eb544b717fa009394522ffd3dd0cfb4bc5f5cc6f9c13304f7997a5c2d39585f5783ef7b329da043ef490e575f96a304da6b5fb83e87efb75f71c2a3583ff3a6e1338e9b3da665d44c726aeb55a76760066539a01de94652140bf6e2702c5ad2b4712406ebeb18ec7ff8970b706009234e12a73063d9bf576dcefd2f4c9b90f672b48db1ad3813f066ec7bcb9ae703b197726c60a8a8665f9121ca1980d158221bf4565aeedf9c43592b0fcf2ac2a71541174c51bff7a8fde7727c29b6ca8683e3bf799e891d6c781cc48b8aa52509ab1f747a7bd6bf707a142cea7886bd0436d98537966d4e67af9c66c4db645e9d435be7c0553c15d1f90dbb5b67fac7e2491ded8482c3958ff47c0366253ee7f85c6e4286c"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:05:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:05:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x20040010, 0x0, 0x0) 14:05:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1a4, 0x0, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='N'], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:05:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x6, 0x8}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x8) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000006c0)=ANY=[@ANYBLOB="74d0e3dc712a72daf3fd060729f6fcd3fdfac4440300084b97d80d2f5cd0145e284fbce10b434e55d16d0743fcc7d7714a82809aeb1c", @ANYRES16=r3, @ANYBLOB="280328bd7000fcdbdf25070000000c000900080001000300000008000200040004001c0009000800010004000000080001000100010008000200ae0300001c00090008000200e9c70000080002000100000008000200fbffffff8800010044000400200001000a004e2100008000fe80000000000000000000000000002104000000200002000a004e2400000063fe8000000000000000000000000000180100000008000300060000001400010069623a626f6e645f736c6176655f300008000300010000000c0002000800020002000000100001007564703a73797a3100000000140001001000010069623a76657468300000000068000100100001007564703a73797a32000000001c000200080003000200000008000100130000000800030001000080380004001400010002004e23ac1414bb0000000000000000200002000a004e21000000090000000000000000000000000000000105000000d00001000800030085e800002c00020008000300ffffffff0800020040010000080001002000000008000200ff0700000800030020000000100001007564703a73797a32000000004c00020008000300018000000800040006000000080001001e000000080002000400000008000400040000000800040002000000080002000500000008000400050000000800040001040000080003000001000034000200080003005957000008000200800000000800040000000000080002000900000008000100000001000800030006000000100105000400020008000100756470000800010075647000080001007564700008000100696200000c00020008000300040000004c000200080003000900000008000100190000000800010011000000080004001f00000008000200090000000800030001010000080001001700000008000100200000000800030027d5ae37540002000800020009000000080004009b280000080002000100008008000400020000000800030005000000080001000a00000008000300050000000800040008000000080001000f0000000800030005000000340002000800020000000000080002000000010008000200ff0f0000080004007269000008000300e38c000008000200000000000800010069620000"], 0x344}, 0x1, 0x0, 0x0, 0x4094}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 684.649157] kauditd_printk_skb: 86 callbacks suppressed [ 684.649165] audit: type=1400 audit(1556719551.161:5973): avc: denied { create } for pid=30526 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 684.875563] audit: type=1400 audit(1556719551.161:5974): avc: denied { write } for pid=30526 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:05:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$dspn(0x0, 0x3, 0x8000) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x1}, 0xb) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000200)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x3000, 0x1d001, 0x7004], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 685.072565] audit: type=1400 audit(1556719551.261:5975): avc: denied { map } for pid=30533 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 685.321156] audit: type=1400 audit(1556719551.261:5976): avc: denied { map } for pid=30533 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:05:51 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x4e, 0xffff, 0x21, 0x6, 0x2, 0x7f, 0xf57, 0x6, 0x2da, 0xffffffffffffff26, 0xd, 0x3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 685.587193] audit: type=1400 audit(1556719551.271:5977): avc: denied { map } for pid=30536 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 685.633558] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.647203] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.696326] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.709288] audit: audit_lost=1004 audit_rate_limit=0 audit_backlog_limit=64 [ 685.735371] audit: audit_lost=1005 audit_rate_limit=0 audit_backlog_limit=64 [ 698.981357] IPVS: ftp: loaded support on port[0] = 21 [ 699.626960] kauditd_printk_skb: 124 callbacks suppressed [ 699.626969] audit: type=1400 audit(1556719566.141:6077): avc: denied { sys_admin } for pid=30576 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 699.721852] audit: type=1400 audit(1556719566.151:6078): avc: denied { setgid } for pid=30577 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 699.815738] audit: type=1400 audit(1556719566.171:6079): avc: denied { sys_admin } for pid=17927 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 699.907472] audit: type=1400 audit(1556719566.181:6080): avc: denied { setgid } for pid=30579 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 699.985570] audit: type=1400 audit(1556719566.181:6081): avc: denied { setgid } for pid=30578 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 700.056208] audit: type=1400 audit(1556719566.191:6082): avc: denied { sys_admin } for pid=17927 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 700.126306] audit: type=1400 audit(1556719566.191:6083): avc: denied { setgid } for pid=30575 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 700.202846] audit: type=1400 audit(1556719566.191:6084): avc: denied { sys_admin } for pid=30576 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 700.552822] IPVS: ftp: loaded support on port[0] = 21 [ 702.737917] audit: type=1400 audit(1556719569.251:6085): avc: denied { sys_admin } for pid=30686 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 702.861150] audit: type=1400 audit(1556719569.271:6086): avc: denied { sys_admin } for pid=30815 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.524216] IPVS: ftp: loaded support on port[0] = 21 14:06:10 executing program 0: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:06:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @multicast1}, {0x2, 0x0, @empty}, {0x2, 0x0, @local}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x20000000000000}) 14:06:10 executing program 1: ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x00\x00,\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 14:06:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 'syz0\x00'}) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 14:06:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x0, 0x0, 0x1d001, 0x7004], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:10 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) accept4(r0, 0x0, 0x0, 0xfffffffffffff) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) fcntl$setlease(r1, 0x400, 0x1) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00b00a94c2d1f55345755c2cfa07e40381bd7000000000000d00000008000600e10b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:06:11 executing program 3: ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x3, 0x1ff, 0x2, 0x0, 0x0, [{r0, 0x0, 0x4}, {r0}]}) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)=0x8) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{}]}) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000240)=0xff, &(0x7f0000000280)=0x4) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @rand_addr=0x2}, {0x2, 0x0, @broadcast}, 0xfd, 0x0, 0x2, 0x46a}) [ 704.975765] kauditd_printk_skb: 8 callbacks suppressed [ 704.975774] audit: type=1400 audit(1556719571.491:6095): avc: denied { sys_admin } for pid=30831 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 705.425126] device bridge0 entered promiscuous mode 14:06:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socket$inet6(0xa, 0x10000000000002, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYBLOB="c61f4cd9f60d03731ab83e14180000000000000000f9101cceeb3aaa308f6f5e1b42e68f8b5924e6453526ca345499a3dc8f371b0615817e09891cefeeeb539153fe71b668"], 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x14, &(0x7f0000000040)=0x10000, 0x4) [ 706.379160] audit: type=1400 audit(1556719571.551:6096): avc: denied { sys_admin } for pid=30831 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:06:13 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000000)=0x9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) [ 707.366438] audit: type=1400 audit(1556719572.961:6097): avc: denied { create } for pid=31047 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:06:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 708.100458] audit: type=1400 audit(1556719572.961:6098): avc: denied { write } for pid=31047 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 708.142853] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.148706] audit: audit_lost=1014 audit_rate_limit=0 audit_backlog_limit=64 [ 708.154074] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.158409] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.168103] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.169883] audit: audit_backlog=65 > audit_backlog_limit=64 14:06:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x10000) [ 710.098014] kauditd_printk_skb: 168 callbacks suppressed [ 710.098023] audit: type=1400 audit(1556719573.301:6099): avc: denied { map } for pid=31421 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 710.216174] audit: audit_backlog=65 > audit_backlog_limit=64 [ 710.263812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 710.269842] audit: audit_lost=1072 audit_rate_limit=0 audit_backlog_limit=64 [ 710.300206] audit: audit_backlog=65 > audit_backlog_limit=64 [ 710.336659] audit: audit_backlog=65 > audit_backlog_limit=64 [ 710.438509] audit: audit_lost=1073 audit_rate_limit=0 audit_backlog_limit=64 [ 710.621083] audit: audit_lost=1074 audit_rate_limit=0 audit_backlog_limit=64 [ 710.629931] audit: backlog limit exceeded [ 710.674483] audit: audit_lost=1075 audit_rate_limit=0 audit_backlog_limit=64 [ 715.263180] kauditd_printk_skb: 135 callbacks suppressed [ 715.263189] audit: type=1400 audit(1556719581.781:6208): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.361866] audit: type=1400 audit(1556719581.881:6209): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.431324] audit: type=1400 audit(1556719581.921:6210): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.531135] audit: type=1400 audit(1556719581.981:6211): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.584905] audit: type=1400 audit(1556719582.101:6212): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.661172] audit: type=1400 audit(1556719582.131:6213): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.756681] audit: type=1400 audit(1556719582.271:6214): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 715.940681] audit: type=1400 audit(1556719582.451:6215): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 716.001146] audit: type=1400 audit(1556719582.471:6216): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 716.087543] audit: type=1400 audit(1556719582.601:6217): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 724.121365] IPVS: ftp: loaded support on port[0] = 21 [ 725.921275] IPVS: ftp: loaded support on port[0] = 21 14:06:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001, 0x7004], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fstatfs(r1, &(0x7f0000000400)=""/128) timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f00000004c0)={{0xffffffffffffffff, 0x0, 0x732d, 0x3, 0xfffffffffffffff8}, 0x8, 0x10000, 0x2}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x20000) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000600)=""/226) r5 = semget$private(0x0, 0x4, 0x4) semctl$GETPID(r5, 0x7, 0xb, &(0x7f0000000080)=""/20) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22}}, 0xfff, 0x82b5}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYBLOB="6f630a4dd8b0aa0f5ba1ee593dcc0ae1e172df2a44d5a5f6af26fca8496e6f1e35bdf3afa86934a141bb7dad459446cba0e4025b1fa469b6"], 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000000100)=""/94, &(0x7f00000001c0)=0x5e) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$void(0xffffffffffffffff, 0xc0045878) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_SET_DEBUGREGS(r6, 0x4080aea2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000540)=""/32) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 14:06:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(0x0, 0x3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:33 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) r5 = getpgrp(0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000040)={r4, r4, 0x9}) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) socket(0x0, 0x80003, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r3) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r8 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r8, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r7, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r9, 0x8, 0x2ed9dec5a6a2d3bb}, 0xc) 14:06:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, &(0x7f00000000c0)=0x4) 14:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x0, 0x0, 0x1d001], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:33 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@rand_addr="b1dd07879674a0a738b8ded16ccd11e9", @mcast2, @mcast2, 0x2, 0xfffffffffffff586, 0x7f, 0x0, 0x0, 0x890044, r2}) 14:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x8000) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x0, 0x0, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 727.329075] kauditd_printk_skb: 6 callbacks suppressed [ 727.329085] audit: type=1400 audit(1556719593.841:6224): avc: denied { create } for pid=32027 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 14:06:34 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000380)={0xffff, {{0xa, 0x4e20, 0x1f, @dev={0xfe, 0x80, [], 0x18}, 0xfa}}}, 0x88) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x4, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:06:34 executing program 1: [ 727.857446] audit: type=1400 audit(1556719594.351:6225): avc: denied { map } for pid=32039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:06:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_getscheduler(r1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e24, @remote}, 0x200, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)='rose0\x00', 0x1f, 0x7fffffff, 0x5}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x840c0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f00000001c0)={0x962, 0x7, 0x3f, 0x7fff, 0xf, 0x7}) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) [ 728.074117] audit: type=1400 audit(1556719594.371:6226): avc: denied { map } for pid=32039 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.151357] IPVS: ftp: loaded support on port[0] = 21 [ 728.241113] audit: type=1400 audit(1556719594.381:6227): avc: denied { map } for pid=32039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:06:34 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000000)=@broute={'bro-te\x00', 0x20, 0x1, 0x9c0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'bridge0\x00', 'vlan0\x00', 'sit0\x00', 'teql0\x00', @empty, [], @link_local, [], 0x8b8, 0x8b8, 0x930, [@among={'among\x00', 0x820, {{0x0, 0xc}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c77"}}}}]}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0xa38) [ 728.448882] audit: type=1400 audit(1556719594.391:6228): avc: denied { map } for pid=32039 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.794287] audit: type=1400 audit(1556719594.451:6229): avc: denied { map } for pid=32039 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.965963] audit: type=1400 audit(1556719594.491:6230): avc: denied { map } for pid=32039 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 729.157494] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 729.211089] audit: type=1400 audit(1556719594.501:6231): avc: denied { map } for pid=32039 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 729.303714] ebt_among: wrong size: 2080 against expected 1044, rounded to 1048 [ 729.401927] audit: type=1400 audit(1556719594.561:6232): avc: denied { create } for pid=32027 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 729.445470] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.296279] IPVS: ftp: loaded support on port[0] = 21 [ 736.346520] IPVS: ftp: loaded support on port[0] = 21 [ 737.007275] kauditd_printk_skb: 99 callbacks suppressed [ 737.007284] audit: type=1400 audit(1556719603.521:6309): avc: denied { sys_admin } for pid=19382 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 737.101294] audit: type=1400 audit(1556719603.571:6310): avc: denied { sys_admin } for pid=19382 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 737.941303] IPVS: ftp: loaded support on port[0] = 21 [ 739.662087] IPVS: ftp: loaded support on port[0] = 21 [ 741.151440] IPVS: ftp: loaded support on port[0] = 21 [ 743.171954] IPVS: ftp: loaded support on port[0] = 21 [ 744.196413] audit: type=1400 audit(1556719610.711:6311): avc: denied { setgid } for pid=32186 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 744.291199] audit: type=1400 audit(1556719610.761:6312): avc: denied { setgid } for pid=32185 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 744.386398] audit: type=1400 audit(1556719610.761:6313): avc: denied { setgid } for pid=32187 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 744.504590] audit: type=1400 audit(1556719610.801:6314): avc: denied { setgid } for pid=32188 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 745.051396] IPVS: ftp: loaded support on port[0] = 21 [ 745.977389] audit: type=1400 audit(1556719612.491:6315): avc: denied { sys_admin } for pid=32209 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 746.111884] audit: type=1400 audit(1556719612.491:6316): avc: denied { sys_admin } for pid=32209 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 746.201950] audit: type=1400 audit(1556719612.531:6317): avc: denied { sys_admin } for pid=32210 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 746.275700] audit: type=1400 audit(1556719612.531:6318): avc: denied { sys_admin } for pid=32210 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 746.387097] audit: type=1400 audit(1556719612.541:6319): avc: denied { sys_admin } for pid=32219 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 746.461338] audit: type=1400 audit(1556719612.541:6320): avc: denied { sys_admin } for pid=32219 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 14:06:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x0) 14:06:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1a4, 0x0, 0x0, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:06:53 executing program 5: openat$pfkey(0xffffffffffffff9c, 0x0, 0x81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x68000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x100ffe, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x40b40) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x300, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbe1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008800) 14:06:53 executing program 2: pause() r0 = socket$inet6(0xa, 0x3, 0x100000000000008) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 14:06:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socket$inet6(0xa, 0x10000000000002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @loopback, 0x0, 0x2, 'dh\x00'}, 0x2c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) ptrace$setopts(0x4206, r3, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x18, &(0x7f0000000040), 0x4) 14:06:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @empty}, {0x2, 0x0, @broadcast}, 0x9, 0x0, 0x2, 0x46a}) setsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000000)=@srh={0x0, 0x4, 0x4, 0x2, 0x4, 0x8, 0x8, [@empty, @dev={0xfe, 0x80, [], 0x18}]}, 0x28) 14:06:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000240)='\xff\a\x00\x00\x00\x00\x00\x00', 0x4) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x20000) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000200)=0xc) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000380)={r2, 0x1, 0xfffffffffffffe0e, @local}, 0x10) recvfrom$netrom(r1, &(0x7f0000000080)=""/201, 0xc9, 0x100, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e1f, @loopback}, {0x2, 0x4e20, @multicast1}, {0x2, 0x400000000000000, @broadcast}, 0x800000000000006, 0x0, 0x2, 0x46a}) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000003c0)="7f11cd3895a306e73e664321d4900147cc4ecdc422834ff8bd6644bde5e6e95c93d6c44870b3702123cc633255f17f3efb0e429b7c2ab7ada685c9dc7bfb380c453cf3341e8162ded6a7e047ef8564837028c8b536f716e66e636cbc91a4ce9ce2568e65168635bbfad9feaa60fa409606c5e4d4c8568aa8b8dd24eff2025cd4b4badb4cb125576ba682c33b86ca4174745fe1e78dfc1272ae125e2ae749a725b79be62acc8d31e0981f60526183901d09ad51c440e51ef09aae8a502e3fab7e5906ca5c8ce0159e99b731c0559a1f8c9d77629db8e6c18690e0ecacdb5c48ac8784221f5c230db68885571e30a6c31e099874639b400869b68d2290eeab7be07a692afe9e23fadef9251025e46a5dacc43f77a0121a28569d1d166d04d370d41e1a814997b37bda0acdbd2eff0c438429d3bc88a110926373a834ba4d7fb2fafaa6344b1fc0887b7993bbb77e6bf2b365dd2a5f8327ee5c54e692ef9dafc061e1a508ab4a89ae683db1fa6755a47a5988eeb67e52ce42f49afa9e554e7042a369ed96e6cd7232ce4ecf103255bbd1e1c22ccd69b614acd5151e07f0d3f2a71025f83d57b5d764260df015543ac2acf3a4caf419b0e6a20eb6c7ce5b1a774ae38e809499b2438cf360fe4884c4cd4c498f98771deda5611a0d8965ccf3b153ff305a02d71cac5115af25693b1f63dbbd8b0170a57a04e26ff4335d0912f88db46969165f1393883750c3df9dc57aefab72577f2650d1e4321a9a7263fbe8bc95e86486735b92ebcf68ab285b2a1d1b68e7a701fe78a34c3a61a33ab966c2a3034078289dd7d9cd837b820d922a359d449b81d163494cc94f74a9e90156fd6271c43215bf03890e2cc39707677f9ef68db0ae6a2b2f99816bcf826fdf4e3f000e2f4d362631c2f066c0fd2cf346ceae3eb1ac881211851fd95318ac8b2d8ec8161db661ebeb19f2837cf565f67538751738edad734fccbdd28979ada7f9095f8e4a33300a9fe5a29de7b5712f555b0d51a872545cef3dec44d084ed3a8621a100036be528424410079cd0c4eb963425c85e11428fd42e1f00270e505184c7899259712b3c32ace47a8e5485be8da2169762ba2d5645318423e6da130ddd71f849b13db40b0666707eea4c5bc7fe1a75590d4b013f591c197bb0545703b773c9a3ed09c75d21855ad5c0b8c26b6029e1ac9cb5dcc4dddf4384119d13fb3da61617adc57f7086432bc27485cece6bb3a926b13bd328da2bdfac4ada040b3bf07214a732f702deaa738c398db16eec91c329e1ebd5d737c426630ef5b77a73f9c9a8e4e6f7a8d29900986c0ecf2af71f422ef44815e412da7647690fe402a5369a56bd4199f8fdfd35fb8383e1034b7362e87c00b182d9e2da3c97860ac09f98fe773f3f5922cf220b3b14e0b643f65702642dd1d59b3cef1a2525a3c198de3e454ac09b68f86738552cf03c638a1430ba2e5d4d8adb23d4ba9b425db0a036d786a417f654e09ad224e4212e5ed8da2aba88e1285aa2b068807d074f184e795219a5b40f231eebab31c8a11a8f7767933054a45dae426104f44e081dc2d563eddd4a15b315ef5865179347f03bd8762d51896f2decd0426b76465de6e9cab72849918a38af2ebac5fb475772352f2856585abca83070a62be5d530744717308f9504a20a88acb10448a1e51c87e2af103d642ab64941f59ce97542560f2627599106610907186e210639de707764a09cc34a05286cc8927f68047ef2632f424b819135b327e344c9499a39c47a518e4ed6b024c8526aa7eefc5f54c06ce4d1bf6e201a8fbdc0b52f73971b8b9a37d153557d386e0fb7c4250bdfa59ee45c9373bf04618e582ac1c571a250b48d06fb44292f176c53431d8616f5680e68e5f97c2abef3c7509de7c1701c4dcc3baf839e1a78b7f69ff74d0aab58d7f16b143ef1268ac6cf99e1ee467e83a38edc4f7879854005430a5a20dc88fd6d5afe19496f7603c62338f336b2e96093b8aee8e42c8256dd8c77094bd341ab9caf76eda2f1fa4564830652f60000a58ef2dfa740113b32b97ece658cf489593ff917c589c528eb2aa927d085205f5dfb11247bdad07f43423432e2444dcd5113e37cb35413b16b7cfd2b4b72060ba2912f614fc10675627c0a8a5ea76a2d588ff13eed4b57f7bb961b702504a787696d23ea630414ed62683074cf9a2b76dca7008d406d6baa13bfd1670cb5f9218f6386a12fcff65c3b051210310d9b0209295b742d9efabb686f708e226628c22bd51f525f3cfbe0588fc8638c8c01e796c00e6419edc8e9db1420ee0730a2379c953a7b7f45f91f84d751abbdb5a9e1c1e1532f1227fe1e9c365923a42c45c0aa2bcc32d84303f7582b20c5e95bb72ff1b0ac06273afed2366600aa63b47c9ce2c62b27de80d3469ea212c66756eb4f08c250c743951e5c51e5cf6e26cba387d04a7ad18ef2da4e9718177a693cfb67bc44e4dbdba32362097cf263eca73f9525c34812a409ac6e6e13ad6dd17657dc3b16d84692df560b186c05b73b63ef0b127417d4eefe89bc2172e05d65c2ed1dc9bf7d4a12bc961a4e6c7049e2f1a164544d1f642edc31b6af3b2c9afa8b1dfd9f82c6b6e37b508791ee2cf654fb56363bcda3ad037b75aae030c1da3510638716ec4204241eaa1cfbe74c8918bc009902215a45366d4346224923d8b22d3b82dd3a79960ff304fe80122f7c6d82274c32756f5a2a56502e3509899d402b433a29b894b12c546ec1eb1f7bbdacaaccd37dbdeb5b89c654778a2d06f7f86e60d574d3314065cfa75d0c6e3cf4b4add56ef2979ea03fbd1a5e6195ef2a8f0354a0f52b49941bfd68dd14bb510ab11b255cfa74f3ccc008267a3f95f3fbaec0e9eb31d53a36b59603f2d2f219ff63d276fc6a2df57f87a41b89c5963b6a432fec494a0c8cdc5db42674e6cb99b0e286214b18dae4f924e23cd95d839e528e30bef27837c9d2b9428e9c32ac67770c0197c08fcee31677eaf0b3049c798a9dbf28afc62d0c91f85b723141fca0e7dfdd98ccf53ad7a508380c0d842c5c1c244332dd4002af9ab3a1175705f4b1308dac4ecae563dca966054f400393226189098430758eea9cf92512b99da697ab0469ed6f10490bf4ee2835c651b483084aae9262948c22054952af2f8bab1b0d279ba5fd6baf4fb1855fee2b355e19f9aa5d8f965046c6b0c73edbb794bbb89457d4c3feccc25e21d71ff4c10935803b66684b170da67b1a07bedb5ce13f4057b02b5dcbb15dfc18b788dca295e5b881564e217fbebaf53814a5016c6f94056236e7b7bc94c5dd1ace3803be8dfd4502eddeedde8ffcb6bf9d484545554fe68bfacdc6e4b6c14a6edc65b0fcb0df1a38ed63ddd2d6671576f5cef5091f0954b5ed8dcb3b23dd01fa8f811793a3215906a9ccfa618c7384e9629e525a79f4753f0dc5a8862a5f67dd77e457c793318eabbcaba9ed4cab1ac024b68de12e2f89775ce03fc0fe193bed186ed0f2ea5f81ccbc67f1045b524d2f12994430ae9d3d9bc44a479483efd258728d99d179af84ce3a631d8338e5465fa4895d6e3d64da877cd1aac20cbfa0f107186c11c01e59f9bf9b0fedb761748a7646e0dfe185f22de5323cc9d4f90205e15c36668ae73738c61100d19fe39e62e85ee6e910d1d96c2f2bbd14175d5b34f52f0463025fbe94658b88ace8dd5af91737161779de08f71e133ae85382c976c8c3c385db494a954ce3b9f8b9f1f7ff04e05882eecadf7e0a64604700cce79c1b1057baa05b7497e4dad61647afb95eafb6f6fd5f3dd23b8ccb18123c706ca9cc9e77b0de1747046fccb821bef432202006818a74faa99aac536c39bc30c291aa1569917da8ba2737858f05ee0aaa34488aa011ee8b4660a95433e73e32f855671ea6c85c0aba61dff7278797328a85fa8ae49ec52adf117b892d02e7148eac65f4c9600160c6639001022050f65b99161ad209b757c95d63ad0a1f36c25662b2ab0c3293648e3cdb7894d055f7fe4c57908bc111a6f55fd36c0f6c80ef9423c1d6891b472acb83cabfc20e5add0e2272d1e6981fbaf315692889556f47ff31180cf91f4cfa196e60692a478ecf9dd135a320a4c41ca1fbc0a9af6a56b50aae88e182ed67a64b35cd2be41f02f604fc411d7dc64ea5bdab7f9c966bdc25c98897b27584faa540c0197aaaa80ff22f0af211e4cdffc5a241d136b06fe209620e86d002316a8e3296fe8a2642a1d1a7b75fa01e899bd25da8b402c0b2e3ef053ab55f1e44334891ef2da3b6bf5ac31b5af4ba791fbdd249c827887d52e7fe10016a525177d054d69cbd257679ae01d4b263f2d5f8908bd82344cfc201398be37408e60dbc68392485c454b1657284f268fcf7dcbbcfd1005386230c18bf275070d9f1620571957530c2f1ef4751c64f39ad1f45c78021b148557581cecdfbce153bdfe2a6b678b4b3b0791641b7e3d17578f9ebdaa43f27ffa19c32ff4191d47e2d6b09aa8cfc55670cc17b4e4df418f20d6eca92be41137b618b40fb7c5d2afa2b45807f260d3a223607497f48361ee1c0adcaee62029c5ed35462fe2ad969f7ceb596c0174a5aef248b2e6a60da0866eede53f0fb490c3cfb5ed1270e886ec2c8b75abee40f6a42828b1908629d4eb4f0ac5d7e8106831dbb45b6f230c76ce8f96c6a583704d6b994e0a93c46191f3007ecddc57179ee83f0295e33a970927fc8cc8453a14bb20fa8d3d5b00be4bf2cffa8f8fb47af99cddaf83bf0986ada5987a2bf39c68a33e04aaeaaa44a49ad4afabd90283051a7f0b9f0f3d65cdf73b42d77804728468541495895d1c42995e5300ee89afe80d51760bb994c040d468421852b7f3f337b0378366d88f63fdd2c0fb92d1a51815c29d41b2dfc3ee217d9c9978912bc8ac4de3a24999ad98a7f9dcc11de9f3a1922a44bc05cb8c6476736edb9cd17e97c71fcc8fd9cf0cdc8aa9e9bee595bdcb8451b98d3f585206b89914870cbbb97477fda68df7dd31d1385afe0457ea964a2bae9de19f7f52d2c25e66665305823c2c69d9765edc6e560d15efadd396a1dda46a8f045508c45a828a5000a1d4753a310ed0d166cff045028f21fe6561f25fef467116986b8a0111e758c1ded2c43d99ec77190b895b3b4c5ce1301c27d0b10525b69c80092a35a4b189d4c35607c06ed65152f69a2d73091d6a6037011d3006ac9110b59ce5da89e9ecc3dca51d422069a6b12200bd1f676427bfd40fb513f860226844e2db046b0b61d71be9eb0c6b11f1ac3627ec38d1bc5f90f5f09346ed21a53bbf26796a7a0bb7daeb89518eecdd31d6102139b98bde030d9947156117c1399fbfcdd82a147d80aa499e558322052dc14224379385d96ff13038afcabc2e165a8dbfa30480eb0f560c4a4b69ec4f1f028983f2b4c0de6933154935bbf2099f1fa63189f4f589f13909d50b478c96a331fb0b0664e0f168454fb199160e00c4cde3e7b887213f0a979a53b2f8f4176f32a71e855efc50f21e99b6f32c7f65a0c2883e85d209cbe3a7e59fa82e2cae73b130446acc28a53047a11a6da6b8add8e736213136aaf5aa32a56115c850f129de7bc64b21dd49d46c53812006eefe193a702b975ab50fde53b3707858420d0b1d12999775e91ab74ad9aeeef58b66a0f0d9abf5d3641493c79578750b9b01c72e88db7912b8dd0c96549b616ed052d8eb6ae0620e21ddf655b58d3a4d214f4490783f31d5fce569137bfea67b45bf46d0a1060259112272d8925bf15c189fd05ff43b485b0e6dac2d400ffbd") 14:06:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) 14:06:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x11e}]}) 14:06:54 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000001fe8)) syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') 14:06:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x32, 0x835, 0x0, 0x0, {0x4, 0x1000000}, [@nested={0x4}]}, 0x18}}, 0x0) 14:06:54 executing program 2: dup(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000080)="36044609072198b05d", 0x9) recvmsg(r1, &(0x7f0000000780)={&(0x7f00000001c0)=@sco, 0x80, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000600)=""/171, 0xab}], 0x2}, 0x10002) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 749.094717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 749.847412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 750.292200] kauditd_printk_skb: 58 callbacks suppressed [ 750.292213] audit: type=1400 audit(1556719616.811:6379): avc: denied { map } for pid=32274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.393345] audit: type=1400 audit(1556719616.841:6380): avc: denied { map } for pid=32274 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.481139] audit: type=1400 audit(1556719616.841:6381): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.571329] audit: type=1400 audit(1556719616.841:6382): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.671163] audit: type=1400 audit(1556719616.871:6383): avc: denied { map } for pid=32274 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.711185] audit: type=1400 audit(1556719616.871:6384): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.761132] audit: type=1400 audit(1556719616.871:6385): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.821984] audit: type=1400 audit(1556719616.901:6386): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.895676] audit: type=1400 audit(1556719616.901:6387): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.985745] audit: type=1400 audit(1556719616.931:6388): avc: denied { map } for pid=32274 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 751.605829] IPVS: ftp: loaded support on port[0] = 21 [ 755.467414] kauditd_printk_skb: 1 callbacks suppressed [ 755.467424] audit: type=1400 audit(1556719621.981:6390): avc: denied { sys_admin } for pid=32505 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 755.729197] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.731600] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.753584] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.759432] audit: audit_lost=1092 audit_rate_limit=0 audit_backlog_limit=64 [ 755.766530] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.773040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.774769] audit: audit_backlog=65 > audit_backlog_limit=64 [ 755.778847] audit: audit_lost=1093 audit_rate_limit=0 audit_backlog_limit=64 [ 755.788071] audit: audit_backlog=65 > audit_backlog_limit=64 [ 756.911289] IPVS: ftp: loaded support on port[0] = 21 [ 763.011448] IPVS: ftp: loaded support on port[0] = 21 [ 765.401286] IPVS: ftp: loaded support on port[0] = 21 [ 767.151302] IPVS: ftp: loaded support on port[0] = 21 14:07:14 executing program 0: 14:07:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001, 0x7004], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:07:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0xfffffffffffffffe, &(0x7f0000000000)="3a49ebc9b25c8f0d22f336282309ddea78") r1 = syz_open_dev$dmmidi(&(0x7f0000001680)='/dev/dmmidi#\x00', 0x8, 0x102) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000016c0)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000004000"/104], 0x68) getsockopt$llc_int(r1, 0x10c, 0xd, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:07:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:07:14 executing program 5: 14:07:14 executing program 2: 14:07:14 executing program 5: 14:07:14 executing program 4: 14:07:14 executing program 2: 14:07:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601b0a98004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb14d1fcafff874e50b32881721afab69cc3712c37ed000"], 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0, 0x0) 14:07:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @loopback}, 0x8, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000000)='eql\x00', 0x8, 0x16b1, 0x1}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e24, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x20, 0x0, 0x2, 0x46a}) 14:07:14 executing program 5: [ 768.338361] kauditd_printk_skb: 148 callbacks suppressed [ 768.338370] audit: type=1400 audit(1556719634.851:6479): avc: denied { map } for pid=32690 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 14:07:14 executing program 4: [ 768.535285] audit: type=1400 audit(1556719634.911:6480): avc: denied { map } for pid=32690 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.765411] audit: type=1400 audit(1556719634.951:6481): avc: denied { map } for pid=32690 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 768.947159] audit: type=1400 audit(1556719634.951:6482): avc: denied { map } for pid=32690 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.141519] audit: type=1400 audit(1556719634.971:6483): avc: denied { sys_admin } for pid=32693 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 769.301261] audit: type=1400 audit(1556719634.971:6484): avc: denied { sys_admin } for pid=32693 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 769.391175] audit: type=1400 audit(1556719635.041:6485): avc: denied { map } for pid=32690 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.461151] audit: type=1400 audit(1556719635.091:6486): avc: denied { map } for pid=32690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.541240] audit: type=1400 audit(1556719635.091:6487): avc: denied { map } for pid=32690 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 769.596070] audit: type=1400 audit(1556719635.171:6488): avc: denied { map } for pid=32699 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 771.982344] IPVS: ftp: loaded support on port[0] = 21 [ 774.337561] kauditd_printk_skb: 16 callbacks suppressed [ 774.337569] audit: type=1400 audit(1556719640.851:6505): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.431497] audit: type=1400 audit(1556719640.891:6506): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.496277] audit: type=1400 audit(1556719640.921:6507): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.595165] audit: type=1400 audit(1556719641.111:6508): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.651136] audit: type=1400 audit(1556719641.161:6509): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.732320] audit: type=1400 audit(1556719641.251:6510): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.801268] audit: type=1400 audit(1556719641.301:6511): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.881103] audit: type=1400 audit(1556719641.371:6512): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 774.941336] audit: type=1400 audit(1556719641.401:6513): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 775.147397] IPVS: ftp: loaded support on port[0] = 21 [ 775.158674] audit: type=1400 audit(1556719641.671:6514): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.351785] kauditd_printk_skb: 253 callbacks suppressed [ 779.351793] audit: type=1400 audit(1556719645.861:6768): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.421107] audit: type=1400 audit(1556719645.861:6769): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.501092] audit: type=1400 audit(1556719645.871:6770): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.571162] audit: type=1400 audit(1556719645.901:6771): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.641104] audit: type=1400 audit(1556719645.921:6772): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.725634] audit: type=1400 audit(1556719645.931:6773): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.805786] audit: type=1400 audit(1556719645.941:6774): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.883452] audit: type=1400 audit(1556719645.941:6775): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.953106] audit: type=1400 audit(1556719645.961:6776): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 779.991102] audit: type=1400 audit(1556719645.981:6777): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 783.146161] IPVS: ftp: loaded support on port[0] = 21 [ 784.366426] kauditd_printk_skb: 287 callbacks suppressed [ 784.366434] audit: type=1400 audit(1556719650.881:7065): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.437855] audit: type=1400 audit(1556719650.891:7066): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.502353] audit: type=1400 audit(1556719650.901:7067): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.585705] audit: type=1400 audit(1556719650.931:7068): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.652161] audit: type=1400 audit(1556719650.971:7069): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.737305] audit: type=1400 audit(1556719651.001:7070): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.801917] audit: type=1400 audit(1556719651.001:7071): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.895691] audit: type=1400 audit(1556719651.021:7072): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 784.954806] IPVS: ftp: loaded support on port[0] = 21 [ 784.981730] audit: type=1400 audit(1556719651.041:7073): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 785.041347] audit: type=1400 audit(1556719651.051:7074): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:07:31 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xd9a, 0x800) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x44, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r2, 0xc058534b, &(0x7f0000000080)={0x3, 0x1, 0x0, 0x3, 0x10001, 0x1000}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) ioctl$RTC_PIE_ON(r2, 0x7005) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x101000) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x9, 0x400000) 14:07:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9000008912, &(0x7f0000000080)="1b00"/11) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r2, 0x4038ae7a, 0x0) 14:07:31 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e24, 0x7, @mcast1, 0x3}}, 0x10001, 0x1ff, 0x7, 0x8001, 0x1}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @multicast1}}, 0xffffffff, 0x81}, 0x90) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) syz_execute_func(&(0x7f00000003c0)="c4817dd28558280000a84a2ae91c42bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fc401792b79630b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3f2ef2d0caacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80d672e64670fe54bf10fb0d5e8628f680864360fe25800218de3c0f526c4834149490001c4c151ec2af6a1dd7dbbbfdd5c3ef20f1a00bedcdca1c9fb110f66474f383ae34ba2f2466fb7e2") 14:07:31 executing program 5: 14:07:31 executing program 1 (fault-call:6 fault-nth:0): clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:07:31 executing program 2: 14:07:31 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x175, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000300)="982cef0f050520d0f80791b0024141e2e996855b66f3430f10310fc4014e66f66d220fa0e5be34d1c4e1f8c423fc22eb66450f2d890b00000000006eba0dfe8c73885588a1c40fbbbbe201acac100000000000000f71d539f08171a38a806ebb57660f38f6aecd46fbaac4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b65977318fad8fadfbf365d84006d70a000000") r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0xa72, @mcast2, 0xf02}, 0x1c) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9, 0x400000) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f00000000c0)=0x20) ioprio_set$uid(0x0, 0x0, 0x1f) 14:07:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000140)={{0x9}, 'port1\x00', 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 14:07:31 executing program 3: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0x80000) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) socket$key(0xf, 0x3, 0x2) 14:07:31 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000073f000/0x1000)=nil, 0x1000, 0x0, 0x974, 0x34050) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00009ecff8), 0x2, 0x3) 14:07:32 executing program 5: sched_setscheduler(0x0, 0x6, &(0x7f0000000040)=0x10000007) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x800, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0xce2, 0x34cb3ecd, 0x800, 0x200, 0x0, 0x6d, 0x11000, 0x1, 0x774e, 0xfffffffffffffffa, 0x7fff, 0xffffffff95bb25f5, 0x3, 0x4, 0x3, 0x7ff, 0x8001, 0x1f, 0x9, 0x3, 0xe01, 0x5, 0x0, 0x3, 0x3, 0x8, 0xed21, 0x2, 0xb6, 0x3, 0x1000, 0x7, 0x1, 0x0, 0xb7d, 0x80000000, 0x0, 0x1, 0x0, @perf_config_ext={0x1f, 0x8}, 0x3519a, 0x1f, 0x1e3, 0x5, 0xfffffffffffffff7, 0x1540000000000000, 0x5}, r2, 0xb, r0, 0x2) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x40000000001, 0x0, 0x0, 0x2000000000002) 14:07:32 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 14:07:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x44002, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0x7, {0x20, 0x8, 0x401, 0x400}}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) [ 789.376275] kauditd_printk_skb: 293 callbacks suppressed [ 789.376283] audit: type=1400 audit(1556719655.891:7368): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.451102] audit: type=1400 audit(1556719655.901:7369): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.512440] audit: type=1400 audit(1556719655.911:7370): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.586015] audit: type=1400 audit(1556719655.931:7371): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.651868] audit: type=1400 audit(1556719655.941:7372): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.711090] audit: type=1400 audit(1556719655.941:7373): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.761103] audit: type=1400 audit(1556719655.951:7374): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.801090] audit: type=1400 audit(1556719655.971:7375): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.862902] audit: type=1400 audit(1556719655.971:7376): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 789.935865] audit: type=1400 audit(1556719656.001:7377): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 790.926723] IPVS: ftp: loaded support on port[0] = 21 [ 794.385189] kauditd_printk_skb: 390 callbacks suppressed [ 794.385197] audit: type=1400 audit(1556719660.901:7768): avc: denied { setgid } for pid=390 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.883933] audit: type=1400 audit(1556719660.911:7769): avc: denied { setgid } for pid=365 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.957152] audit: type=1400 audit(1556719660.941:7770): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 795.041215] audit: type=1400 audit(1556719660.941:7771): avc: denied { setgid } for pid=354 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.132681] audit: type=1400 audit(1556719660.981:7772): avc: denied { setgid } for pid=405 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.166448] IPVS: ftp: loaded support on port[0] = 21 [ 795.221414] audit: type=1400 audit(1556719660.991:7773): avc: denied { setgid } for pid=401 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.291274] audit: type=1400 audit(1556719661.001:7774): avc: denied { setgid } for pid=421 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.371089] audit: type=1400 audit(1556719661.031:7775): avc: denied { setgid } for pid=351 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.509758] audit: type=1400 audit(1556719661.031:7776): avc: denied { setgid } for pid=410 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 795.601296] audit: type=1400 audit(1556719661.041:7777): avc: denied { setgid } for pid=346 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 796.866021] IPVS: ftp: loaded support on port[0] = 21 [ 799.353213] IPVS: ftp: loaded support on port[0] = 21 [ 799.413663] kauditd_printk_skb: 302 callbacks suppressed [ 799.413671] audit: type=1400 audit(1556719665.931:8080): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.505059] audit: type=1400 audit(1556719665.941:8081): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.591356] audit: type=1400 audit(1556719665.961:8082): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.661156] audit: type=1400 audit(1556719665.961:8083): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.731248] audit: type=1400 audit(1556719665.971:8084): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.784783] audit: type=1400 audit(1556719666.001:8085): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.861408] audit: type=1400 audit(1556719666.011:8086): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 799.927720] audit: type=1400 audit(1556719666.021:8087): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 800.002349] audit: type=1400 audit(1556719666.021:8088): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 800.068467] audit: type=1400 audit(1556719666.041:8089): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 801.245392] IPVS: ftp: loaded support on port[0] = 21 [ 802.941301] IPVS: ftp: loaded support on port[0] = 21 14:07:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x805) socket$inet(0x2, 0x0, 0x1) [ 804.425707] kauditd_printk_skb: 282 callbacks suppressed [ 804.425716] audit: type=1400 audit(1556719670.941:8372): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:07:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:07:51 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0xd1d3}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000280)={r1, 0xd6, "3a93c7b61c1f800f34d6a62ca6cf678219fda51d4cf7297db0da618423bf31319222c51de4a9566fc8ad7d7b56e4cb5d31419d12301f4507c7e2bb0ad94d989f9886509b2452dd7b2c965064ac8634a58e9664ef6824952e7082d0789e42c51b51b3a192e11394d980a88e800e48bdd3a8ea21ae89b90971a7555fa340fdc261e4bbf5317850f3a492f2ada3aa4dc6e4f489a7c0240dc077b881df4914ab00fd1ea4b3597698f6324850b7df3a5ceeb7033bb490d9ba6e77df7e348dc806d4a36335ec5462d1588585a5ce6be3ae7b9db122ade8781f"}, &(0x7f0000000380)=0xde) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000400)=@null) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$kcm(0xa, 0x2, 0x73) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000003cf98f6cb953ed19e145c900000000"], 0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x8000, 0x0) write$eventfd(r3, &(0x7f0000000100)=0x5d, 0x8) sendmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 14:07:51 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:07:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f00000000c0)) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000001c0)=@int=0x7f, 0x1) 14:07:51 executing program 0: [ 804.562353] audit: type=1400 audit(1556719670.961:8373): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:07:51 executing program 5: connect$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x6}]}, 0x30}}, 0x0) [ 804.641412] IPVS: ftp: loaded support on port[0] = 21 [ 804.712327] audit: type=1400 audit(1556719670.971:8374): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 804.807500] audit: type=1400 audit(1556719670.981:8375): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:07:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x9) r2 = msgget$private(0x0, 0x102) openat$cgroup_subtree(r1, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) mprotect(&(0x7f0000fea000/0x13000)=nil, 0x13000, 0x8) msgsnd(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000000000000713cefec9e640074e36e288f0508fd6b622e6cef1363857157cb6c8c217021685607a871b93d785e7dc954a19429c9d07603b19beda83be8e8e4f60a749e6b6e9ad5d916ae47b265f0fe396e8aa95c20cd389d9bc156e28c470405c8c3d3cd7dd58a035aafd50427d840fbea77d8a8a5daf0050fd86ffff001fb576de7156149233f19a47ff65121f2369c4457824a911ebd51e0271cfb9d2c86535960f7e3f376d1569ab7d37c57c2fc17fb2ac256a066ab320b34a3c616c05dfb4696b53eefb980f6b77844d28ac620ed299426b0fffadd500616"], 0x5f, 0x800) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x800000000000000, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x7, 0x9}) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000040)={0xfffffffffffffffa, 0x84f}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) [ 804.911609] audit: type=1400 audit(1556719671.001:8376): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 805.032175] audit: type=1400 audit(1556719671.031:8377): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 805.145258] audit: type=1400 audit(1556719671.061:8378): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 805.244896] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 805.280643] audit: type=1400 audit(1556719671.101:8379): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 805.285897] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 805.414907] audit: type=1400 audit(1556719671.131:8380): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 14:07:52 executing program 1: clone(0x20003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:07:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x1, 0x1d6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x2, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}, 0x24e) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x50, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0xb9d, 0x4) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:07:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x9, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 805.646771] audit: type=1400 audit(1556719671.221:8381): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 805.652277] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:07:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) fchown(r0, r1, r2) 14:07:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) [ 809.439846] kauditd_printk_skb: 259 callbacks suppressed [ 809.439855] audit: type=1400 audit(1556719675.951:8641): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.511437] audit: type=1400 audit(1556719675.991:8642): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.551333] IPVS: ftp: loaded support on port[0] = 21 [ 809.562372] audit: type=1400 audit(1556719676.001:8643): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.611145] audit: type=1400 audit(1556719676.001:8644): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.683568] audit: type=1400 audit(1556719676.021:8645): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.765688] audit: type=1400 audit(1556719676.031:8646): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.831394] audit: type=1400 audit(1556719676.041:8647): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.902950] audit: type=1400 audit(1556719676.061:8648): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 809.981287] audit: type=1400 audit(1556719676.081:8649): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 810.041688] audit: type=1400 audit(1556719676.081:8650): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 812.681393] IPVS: ftp: loaded support on port[0] = 21 [ 814.447304] kauditd_printk_skb: 497 callbacks suppressed [ 814.447312] audit: type=1400 audit(1556719680.961:9148): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 814.616262] audit: type=1400 audit(1556719680.961:9149): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 814.960316] audit: type=1400 audit(1556719680.971:9150): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 815.320949] audit: type=1400 audit(1556719680.971:9151): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 815.564121] audit: type=1400 audit(1556719681.001:9152): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 815.881525] audit: type=1400 audit(1556719681.031:9153): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 815.910881] audit: audit_backlog=65 > audit_backlog_limit=64 [ 815.920867] audit: audit_backlog=65 > audit_backlog_limit=64 [ 815.936487] audit: audit_backlog=65 > audit_backlog_limit=64 [ 815.973321] audit: audit_backlog=65 > audit_backlog_limit=64 [ 819.454795] kauditd_printk_skb: 421 callbacks suppressed [ 819.454804] audit: type=1400 audit(1556719685.971:9537): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.541985] audit: type=1400 audit(1556719685.971:9538): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.616487] audit: type=1400 audit(1556719685.971:9539): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.711382] audit: type=1400 audit(1556719686.001:9540): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.786092] audit: type=1400 audit(1556719686.031:9541): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.853024] audit: type=1400 audit(1556719686.031:9542): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 819.936006] audit: type=1400 audit(1556719686.041:9543): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 820.025775] audit: type=1400 audit(1556719686.061:9544): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 820.101996] audit: type=1400 audit(1556719686.061:9545): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 820.171104] audit: type=1400 audit(1556719686.081:9546): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 820.591450] IPVS: ftp: loaded support on port[0] = 21 [ 823.911370] IPVS: ftp: loaded support on port[0] = 21 14:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$binder(&(0x7f0000000440)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x4c, 0x0, &(0x7f0000000380)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 14:08:11 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b000510d46f") r0 = gettid() syz_open_procfs$namespace(r0, 0x0) syz_execute_func(&(0x7f0000000240)="c4e379614832074a2be92c40980f053ef3aec4a37bf0c50141e2e902f9eb6666ff95f20d1440062642d9513dc462592e9b100000007902000000f23e47da39c4c2e99cfec482ad934c5efec4215dc2c600518f29f09780992c1dd2410f2acb0441dbe1493e3e660f7616660f7f60d242a0eec5bf521784ae6bc4018d7cf8c5c52e440f8300000080566beeee42319ebb70fe651c58a8271ec4017dda01400f78a90b00000066410f3a162888c423c96cb83d000000fe66410fd1e426660fdf53096bd1047cd8f3450fabe1c4213a5fc066420f383bd46767460f330f01f93ef4f4646666413a0f3830ca30cac442fd21b19b0b0000ef02ddeac4c2901d6996f30fb8bffdffffffe94612c8009ad089d38194d800002ddd8f0b00c4a1b8e74295007b1c8faa701281176c385e938d0000c422b59aa9a7a400002e36646466264683b9080000000d5df82e440fdd0636b287aaaac741afa20f6baf36660f73df8ce39978c104c0418374fb0a070f00ac1e0000000041dfacd008000000699e0000000019821d46edc4037d092101f20f1dbe0010000000e5609722045c0b47cc474cf92f5c439b42a76566470ff8b0074900002856b956ab56c4e2ed3f2ea9bb000042c4414974ecd53131fbf3666646784e3bec") 14:08:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_DESTROY(r1, &(0x7f00000000c0), 0x4) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000100)=0x78) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x6a) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000040)={0x3ff, 0x7, 0x9, 0x101}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0x4d7) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={r3, @empty, @rand_addr=0x8000}, 0xc) 14:08:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000008}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) ftruncate(r1, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 14:08:11 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x420c, r0, 0x0, 0x0) 14:08:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x8b}]}) [ 825.577778] kauditd_printk_skb: 84 callbacks suppressed [ 825.577786] audit: type=1400 audit(1556719692.091:9631): avc: denied { create } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 825.583678] IPVS: ftp: loaded support on port[0] = 21 14:08:12 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) openat$null(0xffffffffffffff9c, 0x0, 0x101000, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x69e}}], 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 14:08:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) 14:08:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10}]}, 0x30}}, 0x0) [ 825.775203] audit: type=1400 audit(1556719692.131:9632): avc: denied { write } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 825.927081] audit: type=1400 audit(1556719692.161:9633): avc: denied { read } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:08:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x3a}]}) [ 826.151317] audit: type=1400 audit(1556719692.271:9634): avc: denied { create } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:08:12 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) fdatasync(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x10, 0x0, 0x2, 0x46a}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x2) [ 826.266044] audit: type=1400 audit(1556719692.271:9635): avc: denied { write } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:08:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x35) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_open_dev$dspn(0x0, 0x3, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000100)={[0x4, 0x0, 0x1d001], 0x0, 0x20}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 826.436656] audit: type=1400 audit(1556719692.271:9636): avc: denied { read } for pid=941 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 826.474002] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 826.581485] audit: type=1804 audit(1556719692.491:9637): pid=958 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/syzcgroup/unified/syz2/bus" dev="sda1" ino=16705 res=1 [ 826.747550] audit: type=1804 audit(1556719692.611:9638): pid=956 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/syzcgroup/unified/syz2/bus" dev="sda1" ino=16705 res=1 [ 826.933944] audit: type=1804 audit(1556719692.611:9639): pid=960 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/syzcgroup/unified/syz2/bus" dev="sda1" ino=16705 res=1 [ 827.105542] audit: type=1400 audit(1556719693.231:9640): avc: denied { map } for pid=968 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 832.791314] IPVS: ftp: loaded support on port[0] = 21 [ 834.078290] kauditd_printk_skb: 32 callbacks suppressed [ 834.078300] audit: type=1400 audit(1556719700.591:9673): avc: denied { setgid } for pid=1027 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 834.266960] audit: type=1400 audit(1556719700.641:9674): avc: denied { setgid } for pid=1027 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.821817] IPVS: ftp: loaded support on port[0] = 21 [ 837.664049] audit: type=1400 audit(1556719704.181:9675): avc: denied { sys_admin } for pid=1061 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 837.982010] audit: type=1400 audit(1556719704.181:9676): avc: denied { sys_admin } for pid=1061 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 838.494951] audit: type=1400 audit(1556719705.011:9677): avc: denied { setgid } for pid=1114 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 838.582233] audit: type=1400 audit(1556719705.091:9678): avc: denied { setgid } for pid=1172 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 838.651184] audit: type=1400 audit(1556719705.161:9679): avc: denied { setgid } for pid=1172 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.011386] IPVS: ftp: loaded support on port[0] = 21 14:08:28 executing program 0: 14:08:28 executing program 4: 14:08:28 executing program 2: 14:08:28 executing program 5: 14:08:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x200000000, @media='eth\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x24004800}, 0x44) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) 14:08:28 executing program 1: clone(0x200000080860001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400800, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x100000001}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r1, 0xc7, "e7ff0d7b790c6b0b1231094fe10b0e97969aca8ab86e66c7387744a3c66d637a024b6d55d926b8804866e3f59ea4188dba7067d00b2e5608534c73112e814a2f1f2159158d0925ff2af270b7fb6e493a5e41a1795013cad7fd12c75798763ce013f753602fce477208215c1fc109e7517b305e8effb3b2b1aae565a7be6038d3a9795a19f5138fe80bd695a879cc17be223b76aeffefa1c26b2f12e9d1bc20efaa792bbbd3aa896ae99072d3eddcaf5923134c8cf87de4c8ec456b2e47f8b82bc2b183f6a3902c"}, &(0x7f0000000280)=0xcf) r2 = getpid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace(0x19, r2) 14:08:28 executing program 4: 14:08:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x1a6, &(0x7f0000000040)=[{&(0x7f0000000140)="2e000000110081aee405d10200000e00fa256b000700000000f3ff500bf800000005000000081c5eda00b0eba06a", 0x2e}], 0x100000000000009a, 0x0, 0x1f2}, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xf8d, 0x400000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000480)=[{0x2, 0x9b1, 0x5a, 0x4, @time={0x77359400}, {0x7, 0x586}, {0x80, 0x9}, @raw8={"4115cc7d89c7069586f88fb5"}}, {0x9, 0x9, 0x4, 0x7, @tick, {0xd63, 0x7ff}, {0x70000, 0x8}, @queue={0x2, {0x9, 0x3}}}, {0x4, 0x20, 0x80, 0x6, @time, {0x2, 0x6a3a}, {0x80, 0x1}, @ext={0x81, &(0x7f0000000180)="8230c3e9babd742131a210d90b1af27f7a41ea865f6bb8fa41e8abeedda34616cbde8dae134b5c021a08229e83eb093a69fac687de12cd9e2566762cf860057490fd2521dc362be04c2545ef40da4b032aa1ae79f4248a95010dc2dac81e87e37b919df409c3b27c5b3ea7e21fbfafacabbb0a93a7eb03421b50727faa6c5d4736"}}, {0x800, 0x0, 0x1, 0x7, @tick, {0x6, 0x3}, {0x80000001, 0xffffffff}, @quote={{0x10001, 0x100}, 0xfff, &(0x7f0000000100)={0x7, 0x9, 0x1, 0x1, @time={0x77359400}, {0x8000, 0x7}, {0x7, 0x100000001}, @ext={0x86, &(0x7f0000000240)="f5e4cfb1f94f829bcc38cfa39caeab415234ac40d5d3d67b367467268455d1f29b2c3f6142070af8cf97f9c7c7b155f7d45a4524a2fbd97e52060f9b382352c2a707961fe723734b3c9f79a5e3cb22f213284446005a69697c7a6830cc6c445a67c64c8017e280fb8cafd31cbdfef588590abf0495733759e73fde7f3f111c2cc6dcc9bef5bd"}}}}, {0x1, 0x3ff, 0x12fd, 0x8, @tick=0x10000, {0x100000001, 0xffff}, {0x2, 0x4}, @control={0xff, 0x7ff}}, {0x9, 0x3, 0x1, 0x1f, @tick=0x1, {0x0, 0x1}, {0x5, 0x6}, @note={0x2, 0xf8e, 0x3, 0x1, 0x7f}}, {0x3, 0x8, 0x1ff, 0x7f83, @time={r2, r3+10000000}, {0xbe, 0x9}, {0x34a7, 0x3}, @ext={0x76, &(0x7f0000000340)="a6f74217b8265387208810cc7cd76fdd81d7c19b2581b38e64d856b637c62584cdfc48c3bd1621e1f1508cd2b9199bc6dd978a353ad457a12d2fc0ad28d8f074039bf44663002b319bcfeacd5ce25732f7a46a77d1411a9192679e535b86dda45d4834ca734861582a4169f7b2db56893be72abd9946"}}, {0x0, 0xde, 0xff, 0xffff, @time={0x77359400}, {0x3, 0x7f7}, {0x4, 0x8}, @control={0x7fff, 0xfffffffffffffff9, 0xfffffffffffffffd}}, {0x9, 0x3, 0x4, 0xbe, @time, {0xf283, 0x80}, {0x81, 0x4}, @ext={0x8a, &(0x7f00000003c0)="57a0761893bb5039b6388acc7f4edfe59e796ad73a0a220bac170e3637ffe8e5c98d1ac74df25b59badeb0208d84dd29ae36187f4d82fc6a5e64c15189bbeaa81c80c6337cf264e30878b97a3c1e9693925756597710278a0b36f21cf9cc3d44cd273926f6875e7dcfc5cf48bf96423d7e7e38aa6b23f0aea5ff3a8ec3519b458d56300b0d811e7d79f0"}}, {0x5, 0xe69a, 0x6, 0xfff, @time, {0x5, 0x7ff}, {0x91fb, 0xffff}, @addr={0x10a, 0x7}}], 0x1e0) 14:08:28 executing program 5: socket$l2tp(0x18, 0x1, 0x1) recvmsg(0xffffffffffffff9c, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/220, 0xdc}, 0x0) r0 = socket$kcm(0x2, 0x0, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80) unshare(0x8020000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x100000001) accept4$inet(0xffffffffffffff9c, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x80000) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r2, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x40000) recvmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000040)=@ax25={{0x3, @default}, [@bcast, @default, @bcast, @netrom, @default, @rose, @rose, @null]}, 0x80, &(0x7f0000002400)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000180)=""/222, 0xde}, {&(0x7f00000000c0)=""/117, 0x75}, {&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/254, 0xfe}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x6, &(0x7f0000002480)=""/164, 0xa4}, 0x2001) 14:08:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x6, 0x0, 0x2, 0x46a}) connect$tipc(r0, &(0x7f0000000000)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x2}}, 0x10) 14:08:29 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x14000, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="66b95f02000066b8be23bd8b66baf9c715020f30eaf3ff40000f9ba500000f38c8e8660f71f40a673626640f20d80f01b94d9b0f00911c520fc78d0000660f3a42f804", 0x43}], 0x1, 0x20, &(0x7f00000001c0), 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa00000000e23f0003000001000000000000002560b700fff0ffff0403ffffffff00000a0000000661"]) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="b600000002faffff850100000000fbff0000000000000572"]) [ 843.096054] audit: type=1400 audit(1556719709.611:9680): avc: denied { create } for pid=1263 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:08:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f00000003c0)="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") mprotect(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000240)={0x0, @rand_addr, @initdev}, &(0x7f00000002c0)=0xc) bind$bt_hci(r1, &(0x7f0000000300)={0x1f, r2, 0x3}, 0xc) [ 843.531275] audit: type=1400 audit(1556719709.611:9681): avc: denied { write } for pid=1263 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 843.911193] audit: type=1400 audit(1556719709.651:9682): avc: denied { setgid } for pid=1241 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 844.256722] audit: type=1400 audit(1556719709.661:9683): avc: denied { map } for pid=1273 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 844.308252] audit: audit_backlog=65 > audit_backlog_limit=64 [ 844.329970] audit: audit_backlog=65 > audit_backlog_limit=64 [ 844.337975] audit: audit_backlog=65 > audit_backlog_limit=64 [ 844.346980] audit: audit_backlog=65 > audit_backlog_limit=64 [ 844.382088] audit: audit_lost=1129 audit_rate_limit=0 audit_backlog_limit=64 [ 844.386051] audit: audit_lost=1130 audit_rate_limit=0 audit_backlog_limit=64 [ 851.562916] kauditd_printk_skb: 120 callbacks suppressed [ 851.562925] audit: type=1400 audit(1556719718.081:9774): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 851.736025] IPVS: ftp: loaded support on port[0] = 21 [ 852.454391] audit: type=1400 audit(1556719718.971:9775): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 853.457987] audit: type=1400 audit(1556719719.971:9776): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 853.526444] IPVS: ftp: loaded support on port[0] = 21 [ 853.547170] audit: type=1400 audit(1556719720.011:9777): avc: denied { sys_ptrace } for pid=21156 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 853.621314] audit: type=1400 audit(1556719720.121:9778): avc: denied { sys_ptrace } for pid=21182 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 853.852708] audit: type=1400 audit(1556719720.371:9779): avc: denied { sys_ptrace } for pid=21174 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 854.196385] audit: type=1400 audit(1556719720.711:9780): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 854.281375] audit: type=1400 audit(1556719720.751:9781): avc: denied { sys_ptrace } for pid=21138 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 855.080277] audit: type=1400 audit(1556719721.591:9782): avc: denied { setgid } for pid=1460 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 855.241281] audit: type=1400 audit(1556719721.621:9783): avc: denied { setgid } for pid=1484 comm="syz-executor.2" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 855.741576] IPVS: ftp: loaded support on port[0] = 21 [ 856.823043] kauditd_printk_skb: 5 callbacks suppressed [ 856.823052] audit: type=1400 audit(1556719723.341:9789): avc: denied { sys_admin } for pid=20149 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.935680] audit: type=1400 audit(1556719723.371:9790): avc: denied { sys_admin } for pid=20149 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 857.571427] IPVS: ftp: loaded support on port[0] = 21