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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:40:52 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x80800, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:52 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) [ 1322.898207][T19281] usb usb9: usbfs: process 19281 (syz-executor.5) did not claim interface 0 before use [ 1322.949926][ T23] audit: type=1400 audit(1579970452.824:1920): avc: denied { open } for pid=19282 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:52 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) socket$inet(0x2, 0x4000000805, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1323.054366][ T23] audit: type=1400 audit(1579970452.854:1921): avc: denied { open } for pid=19284 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:53 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) 16:40:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x8000000, 0x0}) 16:40:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) socket$inet(0x2, 0x4000000805, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:53 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0xa00, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r12, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, r6, r9, r10, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r11, r12, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1323.239961][T19495] usb usb9: usbfs: process 19495 (syz-executor.5) did not claim interface 0 before use 16:40:53 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:40:53 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) 16:40:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0xa000000, 0x0}) [ 1323.368574][ T23] audit: type=1400 audit(1579970453.234:1922): avc: denied { open } for pid=19497 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) socket$inet(0x2, 0x4000000805, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1323.446041][ T23] audit: type=1400 audit(1579970453.254:1923): avc: denied { open } for pid=19499 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1323.502766][T19524] usb usb9: usbfs: process 19524 (syz-executor.5) did not claim interface 0 before use 16:40:53 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) socket$inet(0x2, 0x2, 0x0) 16:40:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}) 16:40:53 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) mkdirat(r2, &(0x7f0000000280)='./file0\x00', 0xb2) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:53 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:40:53 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1323.734737][T19715] usb usb9: usbfs: process 19715 (syz-executor.5) did not claim interface 0 before use [ 1323.747116][ T23] audit: type=1400 audit(1579970453.614:1924): avc: denied { open } for pid=19714 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1323.838242][ T23] audit: type=1400 audit(1579970453.704:1925): avc: denied { open } for pid=19718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x3f000000, 0x0}) 16:40:53 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:53 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1323.975154][T19888] usb usb9: usbfs: process 19888 (syz-executor.5) did not claim interface 0 before use 16:40:53 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="09310000008a606019"], 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r6, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3983530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r7, @ANYRESOCT=r0, @ANYRES32=r1, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x404c800}, 0x8800) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:53 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x391e40, 0x0) r3 = open(0x0, 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x8, 0x1}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r5, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2c00000000000000000000001c00000000000000000000000b0000000000000047504c656d30817c64657600"], 0x2c) getsockname$packet(r7, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x34, r8}) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r11, r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r13, &(0x7f0000000540), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f00000007c0)={{0x3, r10, 0xffffffffffffffff, r11, 0x0, 0x0, 0x7}, 0x3ff, 0x8, 0xfffffffffffffffd, 0x5, r12, r13, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00dfeaedf6", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r0, @ANYRESHEX=0x0], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r14 = socket$inet(0x2, 0x2, 0x0) bind$inet(r14, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r14, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r14, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r15 = socket$inet_tcp(0x2, 0x1, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) write$FUSE_NOTIFY_INVAL_ENTRY(r16, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) mq_timedreceive(r16, &(0x7f0000000080)=""/19, 0x13, 0x4000001, 0x0) 16:40:53 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x40000000, 0x0}) 16:40:54 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1324.171413][T19933] usb usb9: usbfs: process 19933 (syz-executor.5) did not claim interface 0 before use 16:40:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x48000000, 0x0}) 16:40:54 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1324.414405][T20127] usb usb9: usbfs: process 20127 (syz-executor.5) did not claim interface 0 before use 16:40:54 executing program 1: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:54 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x4c000000, 0x0}) 16:40:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1324.622674][T20151] usb usb9: usbfs: process 20151 (syz-executor.5) did not claim interface 0 before use 16:40:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x60000000, 0x0}) 16:40:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:54 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x2, 0xffffffffffffffff, 0xa) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1324.879977][T20263] usb usb9: usbfs: process 20263 (syz-executor.5) did not claim interface 0 before use 16:40:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:54 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:54 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x68000000, 0x0}) 16:40:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:55 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:55 executing program 2: perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc8, 0x2}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x406, r0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d7a0a95505e4ebd4b735b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e323c59675d3947b255dcde3c51b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x1, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1325.142166][T20373] usb usb9: usbfs: process 20373 (syz-executor.5) did not claim interface 0 before use 16:40:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x6c000000, 0x0}) 16:40:55 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:55 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1325.318491][T20390] usb usb9: usbfs: process 20390 (syz-executor.5) did not claim interface 0 before use 16:40:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x74000000, 0x0}) 16:40:55 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) 16:40:55 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:55 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) [ 1325.545348][T20490] usb usb9: usbfs: process 20490 (syz-executor.5) did not claim interface 0 before use 16:40:55 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x7a000000, 0x0}) 16:40:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x500) 16:40:55 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1325.751576][T20515] usb usb9: usbfs: process 20515 (syz-executor.5) did not claim interface 0 before use 16:40:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x500) 16:40:55 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e1f741f1d745456ecfeb61fede7170d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:55 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0xff000000, 0x0}) 16:40:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x500) 16:40:55 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1325.976075][T20608] usb usb9: usbfs: process 20608 (syz-executor.5) did not claim interface 0 before use 16:40:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x0, "16"}, 0x500) 16:40:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0}) 16:40:56 executing program 0: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="09000000010000001605d7a63366b17866cc9f3b06a79d40d40078c27282cbfe8a9827753d753bf61da4671d5e9db046edcfdc1b0a4acf6b1aec438526bf5f70b8a291dd7a22e09dfd6723340d22b998a68d7d2740294c71b61297a82498b327ae420d2e886bf04f8eff4ae000"/119], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r12 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r12, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r12, 0x0, 0xffffffffffffffff, 0x0) waitid(0x2, 0xffffffffffffffff, &(0x7f0000000a80), 0x20000008, &(0x7f0000000440)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, r6, r8, r9, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r10, r11, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dadaedb0bb5c9979b5105b4e1b17c246faa41c0ed361206c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb8109bf190fd1bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d7f7097a68084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc5224611df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b42cbeb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04003300cd8b7d1ff057682dd260ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e000fcffffffffffffe4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d1795000000001ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e000000000075b29a248359d49b9889ec6520bb9e824e73ddfcbec339963f6bc89a8a565323845f14581c85d43b422828ab2c505c4a3668c9cceee81107180f74c484b2e4", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1, 0x0, 0xffffffffffffffc1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x500) [ 1326.275306][T20719] usb usb9: usbfs: process 20719 (syz-executor.5) did not claim interface 8 before use 16:40:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffeffffdfff, 0x873d91a061c1b989) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:40:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:40:56 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x60, 0x3, 0xf7, 0x0, 0x34, 0x2, 0x0}) 16:40:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x5000000, 0x0}) 16:40:56 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfffffffffffffbff, 0xa000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x400, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x4004) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000200)={0x8, 0x9, 0x4, 0x70000, 0x3ff, {0x77359400}, {0x1, 0x0, 0x3f, 0x9, 0x40, 0x8, "b1815a65"}, 0x0, 0x1, @offset=0x9, 0xbc2, 0x0, 0xffffffffffffffff}) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000280)="f1475109f2843b57fb535403c83b3d8999b9b02aa20a6581ab07f1c6c293ba999371270e68b14fe43fdca6ab75ab7a203d9903d875777cced28da6872d2278345231f0fa6f1f6ce08be1a5411b5853a5d867878b366c2db5b791d851f2b126fa0edc3eae48a492bf5c6ffb2b37360f8453fcacfab7b6aae4042ad6aa49736db1afdafb814ed61d166b31452797dd3582a461bb2ce624af7c33fcf70f429234f88879c3ea3eed98df416bcd912ea00362b8ac708b3c67") munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) r5 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1326.746343][T20837] usb usb9: usbfs: process 20837 (syz-executor.1) did not claim interface 0 before use 16:40:56 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000116"], 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="090007681b9385a40600000081da84915359288da10acc0b1f"], 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) socket$pppl2tp(0x18, 0x1, 0x1) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x50) r14 = clone3(&(0x7f0000001680)={0x62028c00, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe59) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r7, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r8, 0x0, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) r15 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r15, 0x800000c004500a, &(0x7f0000000300)) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r8, @ANYRES64=r15, @ANYRES32=r2, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:56 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x501000, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x500) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) mq_unlink(&(0x7f00000000c0)='mime_type%\x00') keyctl$set_timeout(0xf, r1, 0xb286) 16:40:56 executing program 5: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x0, 0x8002, 0x0}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4102, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r7, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$USBDEVFS_RESET(r9, 0x5514) 16:40:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:56 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0105502, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:40:56 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="09064a090000000016bbe63bcfccde8549fc979354c0facf1408512d4c7ca792da437e362f51aa833177efb7d8df44d382520c33bbdeeda7686ffedbe8a614007b0449e504f5f1d092689387ee6c9e4c81eb63b7378de063336a2aeb95a34aa53a1ef4c09f198f5f2965765cf9e3dfd1a4"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8d0000000100000016"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:57 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$netrom(r2, &(0x7f0000000180)={{0x3, @default}, [@netrom, @remote, @rose, @rose, @null, @bcast, @bcast]}, &(0x7f0000000200)=0x48, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x4008800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r0, 0x0, r3) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x94002, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000140)=[@window={0x3, 0x3ff, 0x101}, @window={0x3, 0x6}, @sack_perm, @timestamp, @sack_perm, @mss={0x2, 0x1ff}, @timestamp, @timestamp], 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r6 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1327.126170][ T23] kauditd_printk_skb: 10 callbacks suppressed [ 1327.126185][ T23] audit: type=1400 audit(1579970456.994:1936): avc: denied { open } for pid=21053 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:57 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:40:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x20040) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r6, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000280)="e5a6898c2270a0062e6b37acc7935967bf0b161eb4e2041eafd6961f1d17583f638e4fd329716243ab5d8942cc2127d47dd0d07816e5a2", 0x37, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x2000) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) inotify_init1(0x800) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x10000) r2 = socket$inet(0x2, 0x4000000805, 0x6) ioctl$KDADDIO(r1, 0x4b34, 0x5) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r4, &(0x7f0000000300)="0088cad1b23c83b753246b89cc278460cac2a2141690c10104e2526c816a927372b137616c9c33a46b5489b57cc2c3981b5096908ada65cb092389043248f4f9af960bbc8feec3cc6cbfbc7eebe7d448b7da4dbc9abd0000262c617f476d9efd51ea292863e8f0563f2a14cde7da3dc281d8f172cfbb7c98e5480c2bedf7acc79fb94b43adbdd4e9ecb6103641b94980c6be56c6a5df57b592e05ae66150443935c877e457155004ebb7f1ef7bf4a697aa2a550e3d88a92083c9b4da61694ff8dfbf5e22c3cee460b240245864e3dbffc0606ba91ffc6b426b07cf9d6e13986900"/238, 0xee, 0x4000080, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="4f000015", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x800, 0x0) r7 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000140)=[{r6, 0x8640}, {0xffffffffffffffff, 0x108c}, {r7, 0x1006}, {r8, 0x4}, {r1, 0xe000}], 0x5, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={[0xffff]}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) accept4$unix(r9, &(0x7f0000000400)=@abs, &(0x7f00000002c0)=0x6e, 0x800) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r5, 0x401, 0xa47}, 0x8) [ 1327.355208][ T23] audit: type=1400 audit(1579970457.224:1937): avc: denied { open } for pid=21160 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1327.424614][T21165] FAULT_INJECTION: forcing a failure. [ 1327.424614][T21165] name failslab, interval 1, probability 0, space 0, times 0 [ 1327.479289][T21165] CPU: 1 PID: 21165 Comm: syz-executor.1 Not tainted 5.5.0-rc7-syzkaller #0 [ 1327.488024][T21165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.498097][T21165] Call Trace: [ 1327.501525][T21165] dump_stack+0x197/0x210 [ 1327.505883][T21165] should_fail.cold+0xa/0x15 [ 1327.510607][T21165] ? fault_create_debugfs_attr+0x180/0x180 [ 1327.516474][T21165] ? ___might_sleep+0x163/0x2c0 [ 1327.521360][T21165] __should_failslab+0x121/0x190 [ 1327.526432][T21165] should_failslab+0x9/0x14 [ 1327.530964][T21165] __kmalloc+0x2e0/0x770 [ 1327.535234][T21165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1327.541495][T21165] ? do_handle_open+0x114/0x790 [ 1327.546476][T21165] do_handle_open+0x114/0x790 [ 1327.551177][T21165] ? do_sys_name_to_handle.isra.0+0x4d0/0x4d0 [ 1327.557330][T21165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1327.562831][T21165] ? do_syscall_64+0x26/0x790 [ 1327.567544][T21165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.573839][T21165] ? do_syscall_64+0x26/0x790 [ 1327.579577][T21165] __x64_sys_open_by_handle_at+0x76/0xb0 [ 1327.585230][T21165] do_syscall_64+0xfa/0x790 [ 1327.589763][T21165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.595807][T21165] RIP: 0033:0x45b349 [ 1327.599889][T21165] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1327.619935][T21165] RSP: 002b:00007fc34fa9dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 16:40:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x100000001, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1327.629045][T21165] RAX: ffffffffffffffda RBX: 00007fc34fa9e6d4 RCX: 000000000045b349 [ 1327.637122][T21165] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1327.645112][T21165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1327.653305][T21165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1327.661476][T21165] R13: 000000000000074f R14: 00000000004c8b82 R15: 0000000000000000 16:40:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1327.672327][ T23] audit: type=1400 audit(1579970457.324:1938): avc: denied { map } for pid=21168 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1327.695746][ T23] audit: type=1400 audit(1579970457.334:1939): avc: denied { map } for pid=21169 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1327.751939][ T23] audit: type=1400 audit(1579970457.604:1940): avc: denied { open } for pid=21273 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x2076, 0x4001) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110526616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199815491be65c3154ad160c3b3ea8100cbb96a06f8b0dd4cfd90b52ebf91d96ad7ec56", 0xaa}], 0x4, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x3) ptrace$setopts(0x4206, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setxattr$trusted_overlay_opaque(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x2, 0x1) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$NBD_CLEAR_SOCK(r6, 0xab04) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r4, 0xab05) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x2b, 0x3, 0x1e, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netrom_NETROM_N2(r7, 0x103, 0x3, &(0x7f0000000200)=0x5, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x50, 0x0, "ed7de3805cfd9ab282dddaf6fec9ae17c8938c0be7f21646acada43a43e00c9e57441352e8496d7edfa2ca6aec59bd41fac0e80f6c67850d233281fd9b97f856c54a63a89b9c0284158f2cd6f31a1a4b"}, 0xd8) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$snddsp(r8, &(0x7f0000000580), 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x80101, 0x0) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x404000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS_OLD(r9, 0xc1004111, &(0x7f00000000c0)={0x8d, [0x0, 0x8, 0x80], [{0x0, 0x8, 0x1, 0x0, 0x1, 0x1}, {0x8001, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x80000001, 0x0, 0x0, 0x1}, {0x0, 0x1189, 0x1, 0x0, 0x1, 0x1}, {0x80000000, 0x800, 0x1, 0x1, 0x0, 0x1}, {0x1ff, 0xffff, 0x1, 0x1, 0x1}, {0xfffffff9, 0x4, 0x0, 0x1, 0x1}, {0x2, 0x5, 0x1, 0x1, 0x1, 0x1}, {0x8, 0x80000001, 0x1, 0x1}, {0x884, 0x7, 0x1, 0x1}, {0x4645f18, 0x354, 0x1, 0x1}, {0x8, 0x1, 0x1, 0x1, 0x0, 0x1}], 0x800}) 16:40:57 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:57 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x78, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f0000000040)) 16:40:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) setresuid(r6, r6, r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r9) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x2, r5, &(0x7f0000000340), 0x8, &(0x7f0000000440)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r9, r12, r13, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="400200002400080027bd7025110000008400288080001500d721f121e7a76c2718a3b37820da9ff998354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb6808000000bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9e073806e32b003080027a47803b3e8edc9788008005b00d20426690354b0c91426c7207ea18ede20691ed39dc70288392b61c96983560c212edc84746d720000000000000000", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:57 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:40:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1328.151093][ T23] audit: type=1400 audit(1579970458.014:1941): avc: denied { open } for pid=21531 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:40:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r2, &(0x7f0000000380)={0x21, 0x1, "16305ca2c3e24a2a27b1ec9a2113a200"/25}, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r4, &(0x7f0000000440)={0x91, 0x101, "1639482089f761012a66b2ed6e1c3ef9ba17cb759c6b27d2acd925af2e1dc07921a24cf875aaa62b8e039cd3d0d3786f778c636cfe32c8f8e063d9fa3458fb0bc11dacff8893bf451f77b96b020bc44e4b47395014d0f420b12c09aa87c2b21f3a8df35036096fc13745570fe8b461a629d6d61ed40245a887b1e632686447635cd000000000000000"}, 0x1c000) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r9) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r13, 0x0) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r15, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r7, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r8, r9, r12, r13, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r14, r15, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 1328.474938][ T23] audit: type=1400 audit(1579970458.344:1942): avc: denied { open } for pid=21697 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:40:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x20000008}, 0x0) [ 1328.608457][ T23] audit: type=1400 audit(1579970458.474:1943): avc: denied { map } for pid=21713 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:40:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x20000010}, 0x0) [ 1328.677588][ T23] audit: type=1400 audit(1579970458.514:1944): avc: denied { map } for pid=21758 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:40:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000880)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="db31c818288ebafd5737385039e7e6170ecb74f08ab05188b832bf0d3cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737b33f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba97b01b480ec85a407000000000000002baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550bb31beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef680300000000000000294c6f3ec130662823597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7b55eb4a33bca37a6e5618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb65240100bea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a8c79df071684b0643ced701b6baf95bf233167128d777d557703eda6825afa6894e6333aa2058d51484a99a8e81417ae0e3971b8e6", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1328.813591][ T23] audit: type=1400 audit(1579970458.684:1945): avc: denied { map } for pid=21811 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:40:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x2}, 0x0) 16:40:58 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="0900000071c27c4af8d0c22f760100000016"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x4000}, 0x0) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x1000000}, 0x0) 16:40:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="09ffff000100000016"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x2000000}, 0x0) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x40000000}, 0x0) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="0900000001000000164e276c6cb7a4984bc174bb7e504f11c34f1e90890b7c2d79adc364e292f3f62f3b493d2a4d07962362654030aa18ec10d96aa85e81786ad0e7837c07f102019ef433e4e0253fa32383c1a33664e6c8d37e4fe499fbdec02a156edf948f36558b46a515e314a605c5781be9053d21e79f21d6cf5d746a0c1b0e280385822bf132141966edc83430"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x10) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x7, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x2) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, 0x0, 0x0) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x4000) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, 0x0, 0x0) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:40:59 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="090000000100000016cb9ee43cb2bf7ebc66b996927c00f7a2a81a15a780680efcebb411196d28d42e11297bf874d5b5e8d288cd21380db39811760cd0245d29bfdb7026cf9d408beb84d60dff56a059a8a333961f3b81c22fad7d8dd14181f5e2e0b5a845d0d5c3ed2e165c07a2f41e95df52ceb364bfb2ff6cd0d80743835d6e23a54b77f1e5274fddc19a0a7be09f852b9a69724611ddc5d6efcd49542366e126b3f87b58766add766f85e835d8973871326d8a3dcc6cd6bae4721f3a8c648e0c39a45230c371fd68dd9018383c203aa3edf38e8c257bfa4d79f6411ca1f704dd1f"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000000400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00303005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:40:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x1000000) 16:40:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, 0x0, 0x0) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x2000000) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x40000000) 16:41:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000340)={0xa, 0x1, "0316"}, 0x155480) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r12, r13) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r14, r15) stat(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r16, 0x0) r17 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r18 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r18, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r17, r18, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x100000000000000) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x6f28}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="09000001000000162c7aa9e813de65275e462696f1072527239f45d5b14468de4708314bf4c9326f29eebdf4d2702f96bb7b9415ce21d92017178a0655a3cba19bc76ee3692ff0312588f7236b264049c1ad6bc5969f7cad859979d7abf5b01dbe21a35fea37b7f974e3c482916a98a071212ba7a1e35d379b06b268b3e00e72d7cad3abb4ae7d578b1b19a6f05f0ef82d88b054b484d0f880844f0e4bb0288cf4b6998431f9bb5b283017ab91c70418db4c753b197a5988b510e9c536114ed1dc58cfc118154b1d64f87560d37772cf3815d6db6cacd558dfd0683142ed44ac546c15cd49a84a8a1072216759b10e8937189a63"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r12, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r13 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r13) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r13, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r13, 0x0, 0xffffffffffffffff, 0x0) r14 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r14) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r14, 0x0, 0xffffffffffffffff, 0x0) waitid(0x3, r14, &(0x7f00000003c0), 0xc1000002, &(0x7f0000000440)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, r6, r9, r10, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r11, r12, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x200000000000000) 16:41:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0x1a000, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000400)={0x3f, 0x9, 0x9, 0x1c2, r5}, 0x10) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r6 = open(0x0, 0x10440, 0x81) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x84000000}, 0xc, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="02db701320b71c70518f6336771f2a18ed58c683c2546a9a391c6c351b647b94244e54b5fe06cb2ae563208c8aa9bf44f8086830ba99a12aa9f1e9decfba64695f", @ANYRES16=r8, @ANYBLOB="040025bd7000fbdbdf30d6ff292502000000080004bc5810e200fc7815e0"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x800) sendmsg$NLBL_MGMT_C_PROTOCOLS(r7, &(0x7f0000000880)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x34, r8, 0x20, 0xcc1d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xa85e9001117e4d9d}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008894}, 0x40400c4) sendmsg$NLBL_MGMT_C_LISTDEF(r6, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x38, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x18}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x10) open_by_handle_at(r6, &(0x7f0000000000)={0x8, 0x1}, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r11, r11, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r12, r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r11, 0x0, r12, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) r15 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r15, 0x800000c004500a, &(0x7f0000000300)) sendmsg$nl_generic(r6, &(0x7f0000000140)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r11, @ANYBLOB="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", @ANYRESDEC=r15, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x4000000000000000) 16:41:00 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) 16:41:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)={0x193, 0x0, "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"}, 0x220000) 16:41:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:01 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111200, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000140)={0x0, 0x80}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:01 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r12, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, 0x0, r12, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) r13 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x9, 0x100) ioctl$PPPOEIOCDFWD(r13, 0xb101, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x200000000000000, 0x0) mq_timedreceive(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:41:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r7 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) fsconfig$FSCONFIG_SET_PATH_EMPTY(r7, 0x4, &(0x7f00000000c0)='\\lo\x00', &(0x7f0000000280)='./file0\x00', r4) setresuid(r6, r6, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:01 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8fff2aab8e79df1d2a83"], 0x0) 16:41:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:01 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="d045b2b47809000000"], 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:41:01 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0xa7, 0x0, "aaf2a65dbc474df75a6f17b61d8b1a0a6f68eacc5ff906da2b0bc82391fd80b2cd05bf0ea62409283dba6fe38ca27945ec99c490e13c7e764cb9a51375196c9ff948a7d421464557255c2f0b35848bd6d32f2f4675bb78499ab75fac714554e38b6f133b28213b6457b54ff937f5462c524f0a88c0ae0569a05cfd9f50d6c40aab33cd1a069d8e0168ef00"/159}, 0x103000) 16:41:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="093183fded43000000060f000016"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) r9 = socket$inet(0x2, 0x2, 0x0) bind$inet(r9, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r9, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r9, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) write$FUSE_NOTIFY_INVAL_ENTRY(r11, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) write$P9_RFLUSH(r11, &(0x7f0000000280)={0x7, 0x6d, 0x2}, 0x7) 16:41:01 executing program 1: r0 = socket(0x1f, 0x80000, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x7fff, @loopback, 0x6}, 0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0xca2e0, 0x0) r2 = accept(r0, &(0x7f00000000c0)=@ax25={{}, [@default, @null, @remote, @rose, @null, @rose, @rose, @netrom]}, &(0x7f0000000140)=0x80) sendmsg$NFT_BATCH(r2, &(0x7f0000001e80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001e40)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000180a01010000000000000000030000090c00054000000000000000020900010073797a31000000000900020073797a32000000000900020073797a31000000002c0000000e0a07070000000000000000090000000900010073797a30000000000900020073797a300000000020000000080a2f5800000000000000000c00000a0c0006400000000000000001f00000000b0a010200000000000000000100000808000f4000000006080005400000000508000440000000721c0009800800014000000463080001400000000908000140000003ff0900020073797a320000000092000d4088b84d3b1ed84912de22c405a9f7dc482cbd0cbc91bad86c375e709fca44e985bfdacd62b232ed1a3cb9f8cab07b8acb41d78b34f26638dd7a072983bc10fdbada4c4a4f2c05ba46ff2ae74d44a32917003dfae15bc7705721c73996404854248f79c6eb92cd41cf9e26156ef6579283506fa77d2fa8c59c2be1f5c6b42ae2b0498e5100000800054000000020200000000e0a01080000000000000000000000000900010073797a3100000000280000000e0a010200000000000000000300000a0900010073797a300000000008000440000000028c1a00000c0a010300000000000000000e0000038c030380100000800c0004400000000000000003e00100800900090073797a32000000000900090073797a3000000000ac010180440001003c6fdcb552c68ede7e0995204fc7dd953248102a0fdfaca328f2e434d6ef028868a299267c2f1e4de166c50e0864794e6b2c9b2492e4957b2aed0bfbbaae718466000100693ee9a30a01affab958aabe97fbeb8a6840f7bba5076ca2427c07913de359d4ede266eec80f4712282c6beb94d9d8d5e0e712194ca6ea00c72d1a54ca6ca31ed33a4e396f43de950b1b4a4bd4599349de9d68de3c4fbca26db79975c0c2845f290400005400028008000180ffffffff08000180ffffffff08000180fffffffd0900020073797a32000000000900020073797a320000000008000180ffffffff0900020073797a31000000000900020073797a3200000000a7000100a5349e605e92d2f4d007edc7d125040c812809fe3d311c6da06f20046525babddd26d76d9408c533195beb6d16cbe4e336542bf5ab08b6284453b5f4e1f74d223386b0d3911d585b6f0826fde0072b40ab79290229f0763b5df2e5cab49c6b5d2404e23b471a92f8846205c92f52ca3eb16aa6afc79269d22690082f37c52f73eeffd18908b99f8f5db9c08a0794d45eb8243e7afc02ad4b05a772141795e8d29ac15e000c00054000000000000000d20c0004400000000000000028980100800c0005400000000000000000880101805400028008000180fffffffc08000180000000000900020073797a32000000000900020073797a31000000000900020073797a3000000000080001800000000008000180ffffffff0900020073797a3000000000ab0001003662eb0b9bdced9b87e131e5c67fabaa46aff1fdf3c7c7d20680097226060f54474c0461d4020f1a5a21e3efedd5dc9f240608d8101291a76f65998de32a75e62d518fdca789794dc3d6a5b7f08c50593f15651261e903987a12b625c255b2574e8ca58b3ca23d048a26b0bd4b016b24d234f33eba1bf6e0a9bcba00c7ff8e70fe046fa0333f1772d39ce0e4065ff7bc27f8ff53e70637b322401fe94d82617cfcb6324297a7fc005d0001001d4b44749d1257ed0e7a1985318e458de34b58ffb021d3047f781ba2172c992f9fff59733f403ed1f2242a2eb1aa9ab8848a51ba5c7927a4808e17ad0c055adae61737f0c3f57ecb02d864d39049cfb36beac826fd8189fb640000000c00028008000180fffffffe180002800900020073797a300000000008000180fffffffd0900010073797a31000000000900010073797a31000000000800044000000003080004400000000308000440000000030900020073797a31000000000800044000000003a8160380640100800400078008000340000000010900090073797a31000000000c000540000000000000003f040007800800034000000001bb000640522b2f1efd34ee32775f9b6a21133df99cdaef9cfdf73412594f68dfc31473b043c8d6a2dc863fd9b9cbf0d83e0c204d1e7f8fb9510bc9aeec0aa2e8b5a1e83e8fb62c00ca4666c783e252f02597ba32d55761cf8e3e3a6961b26f6a69f7add6d2451d0730967c4a214f0d1c7d205212f02b62051578aec6e8d2f5b9b166698997225fbd71fb0a6c86d371978b8210cef3d0794b7a13fdd73d7145a8dc0a71b6919d9223592ff5b5f1b8d90dce832a99990c2647a6303d000900090073797a310000000065000640cb4cc56b804b74fe23dd3c85c12da5f41b43f6f4ab58f491221542bb7247b96cfc1f81ac007cb71bc5a1eaf32ef2eba546063172e62d6f3fb08bccda20b6e308442e61edfb784f104b103c40c67ef76891427fe63786ac8a15c02c76c59547287f000000980200800900090073797a300000000088020180190001005df77d1f827585f09f3d9b904b23ee30ec90233c82000000400002800900020073797a320000000008000180fffffffc08000180fffffffc08000180fffffffe0900020073797a31000000000900020073797a3200000000e200010052aa606cab11a04d360994f0ca69ffff8fe85166c3fcd6629e8f6420349a387d0c4f0f0d6289504aa0effba214854977a083c322a9a7549210ef5c075a888202a8c1396ef2c0968db0420af99eddfccd504edc398dd41839771ae6a797eb624d2ec47c87031425c77609083830906971161636a36e257d6771849d5ba9f6535df50f79da0464917bf7bfa9b493a966b3cd9f99ec1e962432d4c111da186a46855126c09f0ba83e6bbe2506d4489f4fa6ca241fe9e58d05d52a6b3afc2e1a4e7c1d777e8b1fd6b2981c6ae3f85735805e359b6ef352459edd52b1171c5ce100002c0002800900020073797a31000000000900020073797a3200000000080001800000000508000180fffffffec40001002b1c5fcaad8a2ba1599e42d343ddd40be8b431d18ff57a29d72ce4f52ba317ec28a2a30a41e2b9eb20d9df296404c7f4b3e197319af4efc45cc3a76ba629aa969f7fc9134b5e1d229ca328f0d1e271d3b67fb6b865d0b034d6aa7325522e6a5df9d8b1d54a7bd48d70428a06e075a2d5124e2187ed350cb7a1c0a07a524d62cf612b79391374118bd82127fd861fe1f161fca7b90e347f6170f740415d4e168e23c2d6e7ed45ffc48261b3d15fc9d9c264e9859667a252892556d66bb7b349e01c0002800900020073797a31000000000900020073797a3000000000380002800900020073797a310000000008000180fffffffd0900020073797a300000000008000180fffffffd0900020073797a3200000000a812008004000780ac010180100002800900020073797a31000000005d000100fa5af9ad19d1462e650fc565bf92d7caca76f67d30a9bffd610f15671a28664b9b41706e438f870f1b8f316201327868d923e56447395103b901767b88e949df35bf5cfe6b59a53819ba3ae270629ed01c7b62a712d2650f930000004d000100e8be37d4cc1f2e603d2d1b65bf1a7695124330948a9ec8901ca8d5dacf64782264e72cd30a9e3b1a2c219b641caf41b0d9e147e24db8d88bdde7d848b163bde83e5eeb026bc73b8b6a000000dc0001007b1f29058d20b9fbaaf33215ad07a7d5ffe1ebaad4084013787344e4bace49b3aac4fcdabbfb8d5f8e501ac5fab2f37e12d17fce3a03bf21fe2c6f34fdff25586a7984fb9dee93ba043b22feee3591d1d3e74ef2a66e9694a15324cf891c9e1d4c394d4da0978b6b835e4ac2f1a13a5d8feb97b6478c24e45e950056889a953e78e0ec30528e97c92b2258af4367a0ff84b0a05fdf07777c34861d836337a7a448138cc0ebfe58099c797cf68e46ca2594706012f58b7e3fb65b3b3772d98f8b0c532aa1f1bfecf80e8aa231e25a73fb0dc6ac371f58e7620c00028008000180ffffffff0c00044000000000000000080800034000000001c8100180200002800900020073797a300000000008000180fffffffd08000180fffffffd9f000100244580787d68d24f39f45fbb5fe0613b75f963c6ab30465b64d230591c6c849fd0ad68dc89d5b555fabfc5ceff8521d4cf8b380ebf640edd01e1274d2714e9916ff3d648cf25f8e17857c5b7c3266023f2648c666f28c92d085e24a82b65caab30eeb62f1e8d4c3d537d5c0aa9654a7f4af2b0d616e0efd98df0d5eee22798f0faf63ec3f8c309c156805c5d563ee7a9addab9c34ae771fe436e86000410010089425b4ed9a2f05ee6569026353d3c186a519e8c02f5d6a7959a10344e73072919d393e48ceb64e7ea929c6791396629fe394d0859b8c377f50d44b5504c7a7dc538e57e9a71fe14e4a0590aea8973de0a1d7d2c0ef4242ef65da6dfbe3c48f2adb021bf3bd9ab3d33a1e9b10d539644f91f50ddf58a373665c76a5a9bfb8e5c115e8075ece11f3cabb57e12f4f76287a9f61a3f46bef3b3e5c231963a108bc1d17b6a5897df2e06066e470722bfdcc485a0deefa424dacd232ccef8d69fd467d71f5bb023d38d29e21920358af31ac5f5e968229da01ebd21b85fcacb6376ee7ff0b0fb6e4a685d888ec3829d2bd313f9e57355c996f1104927cbf3eae03bce7c64d5626834ab4c900e1df97052fd82c47be396ac698d87152de3b40a93d33d6ff3eb33ca7ad6c2d8e729a7fe79965fd95d3b34e3109c0546c99a13e4c6bf83ad6170f4ada1cb5037e10b9cbfecc6f673547eb0a42ee15f27da2cd849a0e4ae157cf60cb71a484ecfe71c92d7cdc6ea238f0a95bb49a0587553fad0137e4f5a157990bfc137c0e77bb0be119cff068b5f1f9553a4e44a5eeea3cca2763fa7929dec9bc57cb67c7d8ea5520da0ffa3d6237640aff291e23b6519b30a81bee32245fe1e46c2f35ece2dde8cae591114cecb9dca8cf67e37605a3c368cba2ac4c82ed1723ed8f29bdd83f0b7e4eca03202268daf140a4b4b4a84d6b5d86b2f9bc6e941b4994eab0f48d500eaf1540ed39f5be3d3fd2c953c0971393a82c31c82eb39f39a71e2e9bc0be320d749fe89dec6ee4509cb22a407c797c7c9503fee748d9e9d55fe3ea5671c62a420d8fb8d73993c70ac5865ace439d6a6e5da3bf7ed4f39cfa25852948dc8b6b700611686b94fffb409f8028dc2dde9df1b6b06def6e0beb77497801f308aea11ba8c0a79a74d946281e97784afb6f5c0660e5d177cccc4459d30c4a3f92eff48adb62be91eb2af1a18aabaa0e473da3484114ae9f2508644357b889dcf15dc4fcac15d1802dd4195db13d1f92ac396973827aae76e262c4b13b76e16bbe315d84e2a831cb16dbe4811b9fdcca6809fb487f2f57861047d91e647f4385252b8ccddd89748f42067c73159be28783275a3f8c1912875aabfb693f7d0b9be1f23916fc576dee178d4a216371100a7dec343eaa3ac75785db69e4178168b0290565b4a677b13016e7312f21e952fb5b0442d980bb9365bf0fd11d3148d10f87548f49f562d3879b2ca1c654fc1e01ca3f5996c0bf5e9c42842ebe7d472d9509bc4128719e59d3ed03ef9ec57a81c24775485249e52c9fc54af04562f8b43d4e797005c25fa230eef2143f5425fa60221092b20f7570f98332fa627d0c402efb35af7c75cde10d315e091d9f0c529f54469d720dd3fac721757d1549c4b92e1a67454a8d527b173ce45c29fb89cb874aa86e27ac56a2baf4f5a590e8d6f79493426f2c127f2984e847abd40d8d9d674b86b6cd75e967b6a391f850ef34d1cf7a610015252d3a6f741478a4389760819185b591d29ef3aa6104a47e0ee29acde2ace7b27d643df779eeb65b24bc462d586660b34b59616d9eaaf27ab40caa5788bb12f1eec198cd6b6d3d10fffa9ca1a69ae83766372b024b3a6648d48387deb00c3cde36a95d3afb26d4cb70a787aa1e8638e62c6075a2adc6d93f82afd0f39861b745e1f2cc66339c55b5dbcdb707cab8d7ddb981ce87347bec49b48d6ed6eb9d8098d367d105e98e7389e2a5e87e0d8937662ce3bd5f191cd54285a0ff5b4e05524632a57e7fa067ad8bbcc21fa49d666da6306eca37e3813e3f2645b96e673f33498a5ae88dd5f6a7303c82e53ec2468ab030b11e4e9d4c8b039c976a8ec5108352d34769958abcefa99e0ed77e08d3e4929fd3a41cc238d5b41b1a032eb2ff0aa84a146a0a765585b00ddbbcf2d7ede556d1d4fa4e4f52fd1ada68417b48e5343e3ccfd8b3741b2e1816a6842d7ee2faaf0b0158f36956d66c9e0b868e93efa1d48ed415428f955bc9c9f49e05baf43ad7090e00d316550aec4cd967a0bf744adf6ddd909c89eee5fb28e5ab3c07eb4b380175688b6614a9870ebcdd3e6c59f2cd408d1969a3e6424135c28f2906453441582204239a083cf0c1103ae23a5ea1a8f486b79a52f8bb9acd077346d096579c3b6f4543ba90bd107470ff6e2e1d7c3ff5d29fb939f7b0825520a5eb7f09f142bf0b547bc0c059143c8cb1e07471b3007e21ce4fac966a2a0fef26ced552828136ce0e9b1af7d2397e572cf1e54e2e61e50aeae0f12e62c13de6914dc71116b6feeccf6f002bf66e97057040354709f7d5fb59d295eb36faa867df8cf20fa2aa27a4767c456c7c0d5ce865fe9e8f081fdc3560cd07e1fb1f03fe8d280459718473727e864724036abc54c270a2a2a6b84b46f58ac1ccb02fa892f6c01710378638df4b3f377c599a07c33d33e72add2a099a42c3f89325a9719b5e83d9448159047b8f54940a3f26c4cd914f3543136afaa56cff4a7ed3bda848ca59786344de197a2965512c384e4aae0b1bb897dc499ef7d578d0104698ee2b78ca16f5fb25b1c469d4252641651fc3f781790f92c4ba90113dfa445a4bca150acf69abd7efe42b70d76c71e8efdb0f4a74d42798c536a53dbef2b8839efb8e0bca6842f45ed0bf42ce623f5d8906f745088cfa5a9111e76a9555a75c32f18c444286cff74ab8e439e72f20fec38202f694ad856275f1813a013935161a0c34667ed2731197f380522305dda61629071d30171ef1bb98dd8cf4dbdce411466947aa6e8809888d458544ddbee79a97fa0e4fa55b5e64560182bf5a659470308bf0ac16e1c9d83b528dac1adf0fb3a50829e2637b29003d19be1ee9ffd3f91b62c35c33601a2c690b888354456b10970ff979cdb342a2bbba06a34437275123e5da02f6f3dfddbef7733b8d89974545bb69d51409c33bb2db2e0dba776777379efd0dd6ad50faf6beb3ab4637351b6bf507351e1b54dc66abc5d3d0180ca5f74e562b0b3bc3d4347be8f84fafc9080ffaec29d7d472fa3170787cc622c1b2b9ace2c4027e4d19ac76532b65becb88bfa36cb8b439c0756c8733d68d894afeb2b8c1dbf720069943f01c45091b6e846139264bccf0e506a2de61435168aee3fcca54e4512dd5f0a8584c8d10c23b8b16c6b98ce1788fdf73e7182b3004b980026787004f47f57608cc8dc82bc672e168a68a8f2b1ef1a61d9c2f959e15ee13b232302e3be50fac82bba00542fd6a904dede365feea1865636e864a50146503a39dc00099f5497b71f6f94e2fadd12f245119c13dd42dd977f1bb7bdeb32318e0943f33299562c7b7423fb217e99e3c44c8ee2240ea084ba053bdfe2a19e4ed64364e8fa862f97e468001170008564743f26a0eb2e77562cc09f4c9089638b73378b4f31fc30a34be9b44ad930797d176a13e6bc3a532f7b9bda45d6fb00a85adca62d6649c29b4a0ed6e90586679260e0d2d95f39fe54d4e71bf1efd9caa6a026cf38e9eb15fb5c5e5acd382aef1a5db41d2d1eebbcee7d802fda2347cf52d075b19304ce8b348c3bdde474c2ed84b93090c2485b1cdf70742ddb6fd31e08f15df156cf24ca6e5266fbf2573342c171acf62574d3d90988a0fb07bd2270ea109958841fdf862a5aaf8a3540947bf0cfdb1dd755be8699f8d04b643a3b41e11bb150d20a2f7bc593c05add64ade76d8210a76a2be42a59fe1755129b1ebd2a99f082521826b16714728e71243853a7bed5da01c42eb15a5285d33555e27598a3d2e0560f292c5245a4f358242afdb8e62ad5dc8fcd30ebd1fdca8ff150a8ecf6063bf1509149029a66d68fa84a4db768ab4ff80f1c968805076b13eb8551c6074543838c1c76429c93769fecec694ba54fe96db6311ab91263e6272f64461ab52ce05e5402bc56b5e3b3e6360fff5b4d07413cd7a1d6e2fcff7945bd0972d9af454d4f3449c4b01f72387d6d26bb641b84c2ae25dd74359c387b3108e121828e17fa3c385132e48f0c69cc14e1da21577b31279ca8dd7e68cc313d368c2c7b16474b22ccd516e726c0adcd21a16a576c84594384fa4adc9e55bab3bec28e2290a5138b287bdff384b817a94171c8c1097827e140baad079dfcd733726b898ee19bd5e3a118c66979c119b52f32f567ddb46ff3335207c3d2615bb144565b8cc12a1d0776e5faac5ff4f9eb0d8a336c3984e95ffff1160308d646b831479823facd94497e3eb37af10618db1370eac5052de52eb10472a3023bdf07285078dd83309e1a6ae7d565a2c6adbf58a9e15e85c9129c99a73138f290288a6bca4d8837f434a786993c21f0d2e97ecb249bd2b9821fac88339d98983a64285738cc5c8bebbdab993bd9d193f706b45bf8fc7f36ab441827f43fb064bee68d13e334aa97080f36f528dd69b945b1a6002310e5aba60a937de8b4875b539c1ca13fa95bb45eda29674f699c439a4811e7018300cf87ca875e028567937fbfd5cbb15cd85b61fd47c0c7e408b6283218c7ee5b5969fe732ba227b2be39c42654f1711410192e877923ae179a842d3fc05e2bc4dd9d699449eca13ff8c3b406940acab5cd5dbbd60286b0592a7696476af085ef57f9d4ce58782f980600c43c6ebe89088d98e583f558dd56b847f694033126085e07580d2ee89ad2a6636d559e0f0095d865c0ba632ee2aacc9ec820d1d42fee200687ec44c41c2242285be5d4031deaa217fc05acc9ff75392c0fd95015c18372ab745873dcb4f4eb347a1e3618a212b1ac170a981be44bf59417a41c9d133f81b2d944e6d8cc0ad969338a6eaf72fdc02bf8f63edc4299d3fa94d109435ca4c5e0760c0007dc8406d5bfcb51f309831217cac302d891e61473fd4cd3b6a6d3b3548d8999f09d454cd5e86668a4f46972a1b5213f00b90ed87fe69247f65bc8809573710c746d8bb6f03ee0fe82ed4e5583b1f4bdc4cb94c4b0db5e4806d28cbe46849c17bc33b8f6274ecabad57913d0f3cfb86f703f9912c81a7a6ba1b3f1e64207d9b6485fa1291aa3a7d85a8db3c98925608314e247329b5c596329436cce5d4e20ba5544e6b2a2e58052186d52e8ed9ad16b83779713494137f945eee2efd0fd2bb6b03ba278750b1601a08d9e06a34a8fc25ab21a97b2e23976dffa00977bbeb3a3404c1c3e86bda28653556e7775e680cb7f15edfaab52b156924b44b7424ba57f727adb320d5ebc284110b92fb09d22a53be0ad18fddb732749ef88b9bd5ce3ebf718414bd3598b60b7ea516bbb63c37fc1cd07ff92868e668cb5da1418ab489f28b540692c1b033387a0b77dde6f9cd85bdd0acf51394fc8ff06ee1ddc4e3853bf4a32284370b02afa62abe82043cc5ddea13c6f1f5a6692a831d27dcf67fa5a9623fdd2d7ee6f6bdcb5c40b14ca80fc6560f92556596306041f6b50321e6e4d2553da0ae7a1f1632ede11c98a3450a76bae6f5d49e95071d708c54bbdbcf2499b1c7e97d885aff5834e7c7bd553f3849407f4ea6e0a0f4828a8eca65fb079785d2d587d040881497774d365583622e185ea18bb06a68e76b5427574fe622b44e7a25715569127b5737cee5cb347f86e7ee7b30741e7afd2e9c48265a40911ff5930cce2921c128cca5ba134d1c8f4fecf430ed56378762874f76c034400499c4bcca671321df43ed88975060d0ee925e2c2883bfdfe2546902b6697f4ea6fa4b5e0e3df8f1d8a42d1821806e8a05111e4a55fa626904366d0ce15ff75a9dcbcfb24ed115885c30b8711a37332f1a6fb14a5fc7db86a3665c6a50800034000000000040007800c000440000000007fffffff140000001100010000000000000000000000000a"], 0x1c7c}, 0x1, 0x0, 0x0, 0x40841}, 0x4000000) open_by_handle_at(r1, &(0x7f0000000000)={0x8}, 0x0) 16:41:01 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c42fc815d89016a31efbea7f992d49fbc8b6022e77f00000034e9f2ecaa1fc1ef237634379e1ba656064cbd32915227d490472938c56c80195e31927ee817d5b81a88e80f59a97e09cc35a7f94b4a921694724abe7588f5c0a4a6ca435f3cfdbe7fc36e2955dd18daf67e9c888db52700a4e1b071e5f1d6feb0eb549e4aeeef55c4b28436ca"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x1}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:41:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getgid() r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x9, @remote}, {0xa, 0x4e24, 0x9, @loopback}, r5, 0xcb2f}}, 0x48) 16:41:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x0, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:02 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="09f7bd9cc7fb191d49"], 0x0) r2 = open(0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r3, &(0x7f0000000380)={0x1f, 0x1, "7d2f8e331003a6037a7d9086cf026b6752c6bff84f1373"}, 0x541c42) socket$inet_tcp(0x2, 0x1, 0x0) inotify_init1(0x80000) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) r8 = syz_open_dev$media(&(0x7f0000000400)='/dev/media#\x00', 0x100, 0x4400) r9 = fcntl$dupfd(r7, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r12, 0x6, 0x21, &(0x7f00000000c0)="c517c11b09309a5873867876c0b49076", 0x10) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r14, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) setresuid(r13, r13, 0x0) r15 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r16 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r16, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f0000000440), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r10, 0x0, r13, 0x0, 0x89, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r15, r16, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5bc68417c6051beec7d05d5352ba422ee6ebbdcaa8152e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c02534b68c175c4dd130e"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:02 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) 16:41:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x81, 0x40100) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1332.360192][ T23] kauditd_printk_skb: 20 callbacks suppressed [ 1332.360207][ T23] audit: type=1400 audit(1579970462.234:1966): avc: denied { open } for pid=23907 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1332.469979][ T23] audit: type=1400 audit(1579970462.324:1967): avc: denied { open } for pid=23950 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:02 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1332.576302][ T23] audit: type=1400 audit(1579970462.394:1968): avc: denied { open } for pid=23950 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1332.686034][ T23] audit: type=1400 audit(1579970462.444:1969): avc: denied { open } for pid=23956 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x224044, 0x8) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f00000000c0)={0x2, 0x3ff, 0x6, 0x2}) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x10, 0x2, [@TCA_BASIC_EMATCHES={0xc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'geneve1\x00', r7}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r1, 0x0, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) write$P9_RWALK(r9, &(0x7f0000000040)={0x9, 0x6f, 0x1}, 0x9) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:02 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="090000000100000016c3bd979f3b047b5c0200000000000000fe45fcea3c464982d67fbdb4bd2166f891f20758ea04af36d8a9b06d171aa40ab578c27f49b6565a08ab459d250b65c3be014f226046c7c4ba020b28"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0800f1ff01000000"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1332.980681][ T23] audit: type=1400 audit(1579970462.854:1970): avc: denied { open } for pid=24169 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:02 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) 16:41:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="995e92a2006251056a43990637197040f4dfe290832cf96d8fbb8505d9cb208f7990cff822f473bb06d8fdec58f01dde886c784269680e1614fe1d2844006f5c00f997fa23c03cabcac194a2ab4ae14a2879fe4a419b7ef4867eb850"], 0x0) r1 = dup(r0) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000200)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x303c98a514656064}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x40, 0x3, 0x7, 0x5, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3ff}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x5}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4801}, 0x24004000) sendto$rose(0xffffffffffffffff, &(0x7f0000000000)="65d441c870198693a934ee6ad58e3f8c28d8147b50f5d090b5f0779e667298ac05f13e033ed2b686dd1dac65bdda632d22391dd310688cb41edbeda98c54b995bcb9ad516aeca8318db547f869efcbeacec2678cfa5f3035105441b16c193229b9c1046963dde626fa4335fb7ac31377db276bfad2ebf062139115885f1d6ce81e7d55655219f3be88b65f23fbda0f22f9b9c27b8fa3fedc83063a222bd006f1f232210c05d33ae178439a816ba08b83855a6ed81ab8ad341994a8f818779e0a0862304b605a696fb6e8a65e477071afa98a080e323575872546864482c38ba1f6b23069bc7e", 0xe6, 0x40000, 0x0, 0x0) 16:41:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:03 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1333.159173][ T23] audit: type=1400 audit(1579970463.024:1971): avc: denied { open } for pid=24365 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1333.228428][ T23] audit: type=1400 audit(1579970463.094:1972): avc: denied { open } for pid=24365 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1333.266917][ T23] audit: type=1400 audit(1579970463.134:1973): avc: denied { open } for pid=24377 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:03 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x72, 0x0, "1d5af81665552d65b41c031e1967f051eac7dc2719baca17b334c52c1ba804714eec4681382f199934590f9f319e099e3539ef0d332983273b1caa7bc8a995013dd39f88930622b8e8de6a7d7576fae9afbb2b5da78888b08b24ad2c58ac2a5bfdb2e3fe78ff98ab8b83"}, 0x800) 16:41:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:03 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="09008b82410100000016"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfffffffffffffffb, 0x80800) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) fcntl$dupfd(r4, 0x0, r5) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, 0x0, r8, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x30d202, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1333.669293][ T23] audit: type=1400 audit(1579970463.534:1974): avc: denied { open } for pid=24790 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:03 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) 16:41:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000000000000f9d72ecef78701f9da26491de4556aeba41551828714fcdb066f75171573f10227f622999b67ea578527ba9396283a57438afe8a839a73cdac6be5819cc205112e46157fd5ec46bedc76bb13248ac2876148ca83510fd505126f1c8cddfad0ac0965a1be8dda4e07f6c35b9afbaf75d7a9cb9de2564c9b24593a2e8cb243778ac84e8f8"], 0x0) 16:41:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) [ 1333.786005][ T23] audit: type=1400 audit(1579970463.654:1975): avc: denied { open } for pid=24801 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:03 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="090048850100010450c5faf9544a0adfde6c919f632f20621451a23144e80bed5f28c73afafbce911cdff511b94c40e2891eff15ff06130df7565510e3c53dbd8d50818861b1259e438e435ee3c778e7bb579c010e250d748d3718f5400909354117a3b939084071446e7ab690bb649fae36282a9d46d0f683906a949296"], 0x0) r1 = open(0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x8, 0x1}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r7, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r4, 0x0, r5, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r6, r7, 0x5}) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r8, 0x800000c004500a, &(0x7f0000000300)) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r9, 0x800000c004500a, &(0x7f0000000300)) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r4, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r9, @ANYRES32], @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000"], 0x0) 16:41:03 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:04 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000040)=""/246, 0xf6}, &(0x7f0000000140), 0x11}, 0x20) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x8082, 0x0) 16:41:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f), 0x0, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 16:41:04 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) 16:41:04 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000440)='-\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffefffbc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = open(0x0, 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x8, 0x1}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r5, 0x29, 0x41, &(0x7f0000000340)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r10 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x80000001, 0x80) bind$bt_hci(r10, &(0x7f0000000280)={0x1f, 0x5}, 0x6) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) 16:41:04 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x1a480, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:04 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) 16:41:04 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r15) 16:41:04 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x500, 0x2) 16:41:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) 16:41:04 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x200a80) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RRENAME(r8, &(0x7f00000000c0)={0x7, 0x15, 0x1}, 0x7) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) 16:41:05 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) socket$inet_icmp_raw(0x2, 0x3, 0x1) 16:41:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r1, @ANYBLOB="262e54252392268530338f1bfa10d15a1e1735a6a0f7b6edde4870744a8c65ecdba45056300bae4bb51eca25e2151011645c5c85503ef34a3a503f518cb032875d32aa42580f52ecbf8ed1b3bb56cf80f535770317c896da590d9f5138e92c84af80af6ba08470a6e12da932019a12c0664b930aece4cd041f4bd1b0f9909445643d6934a7496402b3112444ac094a36ed8278a55bf887df0efa12afb856313ce89f08e43e38b31dd8b17addd1c622556a0b17b8e9971dc61a79eaf0f432e9d13c3de83bfe117c25d1096d427dc41052de502ef2beb27a1109bb669ccbd9423be729ce9999ad2f"], 0x181282) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x4, 0x55, [], 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/85}, &(0x7f0000000000)=0x78) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="2c00000003000000000000000028a78f276543d19ddfc3a694b46b05bb49000000000000000b0000000000008047504c656d303a6264657600"], 0x2c) connect$unix(r5, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x46a03, 0x0) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f00000000c0)=""/19) ioctl$TIOCL_SETVESABLANK(r6, 0x541c, &(0x7f0000000080)) 16:41:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) 16:41:05 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r2 = open(&(0x7f0000000480)='./file0\x00', 0x8400, 0x2) open_by_handle_at(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="095942ce8316b7333c9ee7a84556c2706429655e4e000016a71a0c1daf9194930df27aa85de54ef0ad55dc3423"], 0x0) r3 = open(0x0, 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x8, 0x1}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(0x0, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, 0x0, 0x5}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r1, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r9 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r9, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) ioctl$sock_inet_SIOCRTMSG(r9, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e22, @empty}, {0x2, 0x4e21, @local}, 0xa, 0x0, 0x0, 0x0, 0xd, &(0x7f0000000280)='vlan0\x00', 0x3, 0x4, 0x8001}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$packet_int(r11, 0x107, 0xb, &(0x7f00000000c0)=0x3f, 0x4) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:05 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) 16:41:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f00000000c0)={0x9, 0x80000000}) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x7}, 0x16, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/netstat\x00') ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000140)={r4, 0xfffffff7, 0x5, r5}) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) 16:41:05 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) 16:41:05 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x18c00) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0xffffffff}, 0x0) 16:41:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) 16:41:05 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r6, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r4, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) 16:41:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x3) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10400080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040084}, 0x0) 16:41:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = shmget(0x0, 0x4000, 0xa8000303, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r8, 0xb) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000c00)=0xc) setuid(r10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r11, r12) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r13, r14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r8, 0x1, &(0x7f0000000340)={{0x1, r10, r12, r5, r14, 0x60, 0x8}, 0xd, 0x81, 0xdf00000000000000, 0xfff, r7, r15, 0x8}) r16 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r16, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r16, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) 16:41:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000280)={&(0x7f00000000c0)=[0x0], 0x1, 0x4}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x4000000000, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:06 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r6, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r4, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) 16:41:06 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) sendto$inet(r1, &(0x7f0000000080)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e1f, @local}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000040)={0x7, 0x8, 0x6}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)={0x8}, 0x0) 16:41:06 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setfsuid(0xee00) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) timerfd_settime(r2, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 16:41:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="16596758f3e71bdcc5d27720aedfa9c0350e30d182e6e518e1143821b4912a72921efac0e5bd32036d34f759f5c655e840dd3ec79aa1be4c9e817a331ba9bc42408b31a60b1e2c8cd224f22400abc402cb4a722f19bcdbdcaa34b6c80cc8ac77d7b1d9dd4ef9109f82c4f1cdf7a191c0f7a5c36170120b052351a4ada91100f879a5732e46e7c085ddfd733e5b6b8c61feb32ae13fccc7d0b96846904b3374478596930aee506737d0a79eab761fb8737666c6f064264e52bf4abcde46986f8c3f42"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000000340)={0xc0a08000, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x50) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:06 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) 16:41:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) 16:41:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x1, 0x9, 0x80, 0x4a, 0x0, 0x100, 0x4282, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x9ae5}, 0x1d204, 0x5, 0x800, 0x4, 0x6, 0x9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$binfmt_elf32(r10, &(0x7f0000000bc0)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x7, 0xff, 0x4, 0x40, 0x2, 0x6, 0x7fffffff, 0x1e6, 0x38, 0xdb, 0x9, 0x4, 0x20, 0x1, 0x1ff, 0x4, 0x49}, [{0x1, 0x7, 0x882, 0x1ff, 0xe4, 0x0, 0x3, 0x9}, {0x5, 0x7f, 0xfffffff7, 0x7fffffff, 0x101, 0x7fffffff, 0x92, 0x3}], "4fae8d8f677e97a81c47cc899e46b5a3df766df29a50b1d4a06664b7bf2be4f3ede517624fba4be1283fb008a3610fa6426ffe863750a094f9080d2f7001", [[], [], [], [], [], [], [], [], [], []]}, 0xab6) 16:41:06 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x78) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000e00)='/selinux/mls\x00', 0x0, 0x0) connect$inet(r4, &(0x7f0000000e40)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r6, 0x800000c004500a, &(0x7f0000000300)) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r7, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000580)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYPTR64=&(0x7f0000000b00)=ANY=[@ANYRESHEX=r5, @ANYBLOB="3934e8cc968631498497c2dfd31a546368b52fabdcb5bc98d3576b49f920051ad003b4c10776ec0d92508ebb7af2b4fb972f73c43e75e74dedc7b186", @ANYBLOB="08ca5fbec0553a1f3dbdef41c50a1a1d9baf6fae6df0bf5f72f9333fb632c224134ca18bdffdc3270410b40b83b85f50c905ba130cad076538d174fff76138281a8ecf6ca74f404f782ae7947e2f36ef621481051c304314c32d00000000", @ANYRES64, @ANYRES32=r2, @ANYBLOB="b9bef9b50627d9cd3eaa6c15", @ANYRES16=r2, @ANYRESHEX=0x0, @ANYRES32], @ANYRES32=r6, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYPTR, @ANYPTR], @ANYRESOCT, @ANYBLOB="84932fba0c0b728cdc82c9ab3556e757a73966c4cb"]]], 0x2a0000) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x8082, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r9, 0x8000000000000, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x3a0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x220, 0xf8, 0x0, 0xf8, 0xf8, 0xf8, 0x188, 0x188, 0x188, 0x188, 0x188, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x9}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @remote, 0x7ff, 0x5, [0x31, 0x26, 0x35, 0x3c, 0x28, 0xe, 0x3c, 0x8, 0x7, 0x14, 0x0, 0x20, 0x3, 0x37, 0x7, 0x1d], 0x2, 0xfffffffe, 0x6}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x280) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000240)) ioctl$SIOCX25SCALLUSERDATA(r8, 0x89e5, &(0x7f0000000140)={0x4d, "14a1e89632c2bb95fe458dabfd98dca4ef2e8d237503a82a6c1bf689025769b7e7929744d1c19c8d1e09bd30c78e540979ec36e34839385b528064981b11d0fd4fa12504ef848371e5b755281c3192debc6e29001d98c2b76cdc6732d8dc4abae77891ca3290f06597618b99bbf2cfbbc10ad75fdd5f28b3301ddfb5224b5282"}) 16:41:06 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1337.066621][T27413] x_tables: duplicate underflow at hook 3 16:41:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r15) 16:41:07 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="4800000004000000c3d5448a8275a3bb2e8d4eb5bed4daff17b0bb0100bb8b31a9a50f2919a859d25b30593a5036bfba9028855d326963c55a705ec74efa75c66400000000000000037d5de289518656dabb248efc786f6395cc2efd47ed47c0ccf078ccb169390a2f8fdd1a4cd1a1114376716b76314e4ceb95211b08738d345864bd544da1be2aa8ce414549bbea8af38e9553b6ef8b181fa2c11e161cb8b51477eda20f3ff695542472b7205ac9577e527e436bb3f34ad7"], 0x4041) 16:41:07 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:41:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000000000000"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x100) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r7, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x78, 0x2, 0x6, 0x500, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x6c}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x2}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x7}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x5}]}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x56}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x80) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1337.391335][ T23] kauditd_printk_skb: 33 callbacks suppressed [ 1337.391352][ T23] audit: type=1400 audit(1579970467.264:2009): avc: denied { open } for pid=27753 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1337.497085][ T23] audit: type=1400 audit(1579970467.364:2010): avc: denied { open } for pid=27857 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1337.598835][ T23] audit: type=1400 audit(1579970467.414:2011): avc: denied { open } for pid=27885 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:07 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x141) open_by_handle_at(r2, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="67ddd568e618a6f892a1939092618ec210a760adf7d4587b0bcfe819781f1e7069214fdd2dc507a38b69ee92d04a2a16"]], 0x0) 16:41:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 1337.684825][ T23] audit: type=1400 audit(1579970467.444:2012): avc: denied { open } for pid=27885 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:07 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) 16:41:07 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08000058addceb9d1d0b120000000000"], 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x1ac, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_DTIM_PERIOD={0x8, 0xd, 0x7}, @NL80211_ATTR_HIDDEN_SSID={0x8, 0x7e, 0x1}, @NL80211_ATTR_PROBE_RESP={0x188, 0x91, "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"}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x4020000}, 0x4a9dca21efbb039f) 16:41:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x22000, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r9, 0x112, 0xd, 0x0, &(0x7f00000001c0)) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f00000000c0)={r9, 0x3}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1337.869205][ T23] audit: type=1400 audit(1579970467.734:2013): avc: denied { open } for pid=28236 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1337.943720][ T23] audit: type=1400 audit(1579970467.764:2014): avc: denied { open } for pid=28238 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:07 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) [ 1338.065456][ T23] audit: type=1400 audit(1579970467.784:2015): avc: denied { open } for pid=28236 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r7, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r8) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r12, 0x0) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r14 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r14, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r5, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, r8, r11, r12, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r13, r14, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) 16:41:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x8000, 0x0) read$fb(r1, &(0x7f0000000000)=""/35, 0x23) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x58, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x58}}, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="087f00000475ca00", @ANYPTR64, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES16=r3]], 0x42) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r5, 0x0, 0xffffffffffffffff, 0x0) r6 = getpgid(r5) fcntl$setownex(r4, 0xf, &(0x7f00000000c0)={0xbd7e3901d0a1f59a, r6}) [ 1338.169133][ T23] audit: type=1400 audit(1579970467.804:2016): avc: denied { open } for pid=28238 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:08 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000300)) fcntl$setown(r7, 0x8, r5) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r9, 0x4004556a, 0x5) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r10, r10, 0x0) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r12, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r10, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r11, r12, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:08 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) [ 1338.256674][ T23] audit: type=1400 audit(1579970467.844:2017): avc: denied { create } for pid=28240 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1338.358698][ T23] audit: type=1400 audit(1579970467.854:2018): avc: denied { open } for pid=28242 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) getsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=0x10) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:08 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) 16:41:08 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r9, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000280)={0xf000000, 0x2, 0x500000, r9, 0x0, &(0x7f00000000c0)={0x990a6f, 0x40, [], @ptr=0x3526}}) ioctl$KVM_SIGNAL_MSI(r10, 0x4020aea5, &(0x7f0000000340)={0xd000, 0x0, 0x4, 0x1f}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r6, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r11, 0x0) r12 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r13 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r13, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r4, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, r7, r10, r11, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r12, r13, 0x5}) 16:41:08 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) socket$inet_tcp(0x2, 0x1, 0x0) 16:41:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x20, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f0000000100)) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "c55280a8eadb0737a703657fe4853fed30b0392269b38002df4444306a8744e86fbfd59015bcb6b7d07aefd90018304687fb0afd04175cbffedffc46ee5199c7", "602a95267fd2a488fe2aa8e8b4c5e26ef1ce8704e960c19416c198d344756c9bcbc23961697338c3b36058f722ff5367795ee604818fe04496590c35c8ae71e9", "5b059728def85a01256af697cc66b0ff98859ff357fe9358f88c7ad61b17e24f"}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttynull\x00', 0x101001, 0x0) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f00000002c0)={0x88, 0x4, 0xb8}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:08 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) 16:41:08 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x1ff, 0x4) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r7, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r9, 0xc0505510, &(0x7f0000000340)={0xfffffffc, 0x4, 0x7, 0x380000, &(0x7f0000000440)=[{}, {}, {}, {}]}) setresuid(r6, r6, 0x0) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r10, r11, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r6, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, r4, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) 16:41:09 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000ff0000"], 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x60603, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000200)={0x8000, 0x5, 0x9, 0x4, r5}, 0x10) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttynull\x00', 0x40200, 0x0) 16:41:09 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) 16:41:09 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r5 = open(0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) open_by_handle_at(r5, &(0x7f0000000000)={0x8, 0x1}, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r9, r9, 0x0) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r8, 0x0, r9, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r10, r11, 0x5}) sendmsg$nl_generic(r5, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f795706dbd0b719da9d5e2de196a5260d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) 16:41:09 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000040)='/dev/audio\x00') syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x2) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r1, &(0x7f00000002c0)={0xd3, 0x2, "0789bfceb3458aae9afcaf5051e8cca0db4e5d8d2e2cccd74ddf91615a69a4fa6c1513d18855da6184c903a8cab01119f06b7a025a8bba10e3d8fa80649ffbca94411b03d7272d333a1de5502f37b96e47735d95fdf51723ed09e667819d3944af35dca57f6c07377dc28540a87375955e2e5e22847754eee6bd63a7480fd7d98d016dd9f1843e7fe301e5542ea411517c713972bbfdb5213661bfaa61db763995653415c5a15d7582c78de3df2bac7c22a5167940781018b4703df789e2619fa1c05ae0a4db4060abe2a0"}, 0x0) 16:41:09 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:09 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x280, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08006c35ead40000"], 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x205040, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000140)={@local, @multicast2, @multicast1}, 0xc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000100)=0x4) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000340)={0x0, 0xc1, &(0x7f0000000200)="f172299a6f8c1f85d478f57a903c97a87fb211d61729dc5ca8390fc5e1d6bab378cbfc42359cb1eb86cb4a547cb2268dab2da655f70c008abe84b57811e8048add13efc6ff287bd43d36041cf4eff6fedc2ca7af37382c89875f96c835562b8397a9fb502661150a6037cc86106cf80259b7b50cb7d98e4eb22c4a6fb7787e0662a6d52173ac7bdc1b87ab9f10fcb007d10aa2d668933d67ae7f6d61ce548dc3ed11c95e43b16f34c29e9a3efaf12c638815e3e04354274f070a4639daf4aca1cd"}) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x4008, 0x3b, &(0x7f0000000080)=0xd8a7}) 16:41:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:41:09 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:09 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f00000000c0)=0x6) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, 0x0, r8, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b257dc4e0000000000001365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:09 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x181000, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x400000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$BLKDISCARD(r4, 0x1277, &(0x7f0000000100)=0x4000000000000000) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000040)={0xb678, 0x5940, 0x400000d2, 0x8000, 0x8, "2ee74d9338b583a06159f6df88361a0553963a", 0x1fd, 0x9}) 16:41:09 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="897101fe3fac00ced7d4cb21fc0aeca0ff36ebc2a4fc4a389e21eaa4f78aba23e0d3344023a48cf506fa3d54"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$rxrpc(r0, &(0x7f00000000c0), 0x0, 0x40012002, &(0x7f0000000280)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:41:10 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:10 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)=0x1, 0x4) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x3}, 0x0) 16:41:10 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c12ea4a4164c4ca8a5289543634a4ad0be9f610ca0225ebb66b7c2c17d065899df13e8638ca51ee2cb137e29a7a9d14eed3148b117ad7c0e40b496d9d800fe703ec85d108000000000000008cdf1f42e6121c72ec45524fd1a2e7ca456154b5f3d98e4491a8a895ee05626c93ad85"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r9, 0x0) 16:41:10 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000040)) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:10 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 16:41:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:10 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) open_by_handle_at(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="134c670a90c6e5c85a5c59d81e9db3a8493321c676de08"], 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) socketpair(0x4, 0x800, 0xef, &(0x7f00000001c0)) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f00000000c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000140)={0x4, &(0x7f0000000000)=[{}, {}, {}, {}]}) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ioctl$FICLONE(r1, 0x40049409, r2) 16:41:10 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) 16:41:11 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x17, &(0x7f00000016c0)={0x25, 0x1, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x1, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) 16:41:11 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) 16:41:11 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400002, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000080)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\f\x00\x00\x005<\x00\x00'], 0x0) 16:41:11 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) socket$inet_tcp(0x2, 0x1, 0x0) 16:41:11 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="543fda3a00"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="ef36273800000000000000000003a9426d7335b3b52ec6e1ba021c00"/41], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:11 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b36, &(0x7f00000000c0)='wlan1\x00\xa2\xb8y\xe1\x04\xbe\x00\x00\t\x00\x00\x00\x00\x00!\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x91\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02\xffa\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fk6=z\x8eni)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[o\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2o\xa9\\%\xc8\xfa\xd9t\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cyg-\x97\xa1\xdc\x86\x82Q\xe0\xab\xc1w\x03;-^(\x02=\xf39\xe9yT\xc4\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x10080, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_GEM_CLOSE(r6, 0x40086409, &(0x7f0000000300)={r7}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000140)={r5, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000000c0)={0x1000, 0x85af, 0xe68, {0x200, 0x2}, 0x56, 0xb300}) r8 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r9 = openat$cgroup_ro(r4, &(0x7f0000000340)='memory.swap.current\x00', 0x0, 0x0) bind$bt_sco(r9, &(0x7f0000000380)={0x1f, @fixed={[], 0x11}}, 0x8) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x40000, 0x0) ioctl$SIOCPNDELRESOURCE(r10, 0x89ef, &(0x7f0000000400)=0x2) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:11 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000000008dc4"], 0x0) 16:41:11 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2c00000003000000000000000000000000000000000000000b000000646576003c3b70cae8e44977642846167cf8592427c809b2fbf1e8f19092c889e742d54b2cc17c5a19422bf6c927abf1952516c0ffe2c188f1f34fad3fcbfbb644de96e33f64fdff106ac0c0aecc1ba9de9d6e3d16dc3d7775dada6b00b0ddd2601ad3d1af89fdd700"/144], 0x2c) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000040)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x2000, 0x0) ioctl$SNDCTL_DSP_SYNC(r4, 0x5001, 0x0) 16:41:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) 16:41:11 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:11 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0xffe) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000bc0)) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="091000000100000016"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="11fffffff6000000"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000180), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r10 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r10) process_vm_readv(r10, &(0x7f00000000c0)=[{&(0x7f0000000880)=""/114, 0x72}, {&(0x7f0000000900)=""/74, 0x4a}, {&(0x7f0000000980)=""/103, 0x67}], 0x3, &(0x7f0000000400)=[{&(0x7f0000000280)=""/3, 0x3}, {&(0x7f0000000a00)=""/158, 0x9e}, {&(0x7f0000000ac0)=""/214, 0xd6}], 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0xcc4}, r10, 0x0, 0xffffffffffffffff, 0x8) waitid(0x1, 0xffffffffffffffff, &(0x7f0000000340), 0x1000000, &(0x7f0000000440)) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5e749da6a20d49e61034541a374c301b2575fdd5b1eea978bb71365bad05d5352ba422ee6ebbdcaa8000100001f1d745456ecfeb67222a34a5127fd028af0c7a8d82ffaf570d43cad98bedf799e0cb370ad6d5f9e5fbe2c51598d680719df35687c74a7010ee455b09d6d1179aad0c0ce7674e8deb8af0c7293f8b641f838f70f541fa36590820c7f235252819466e3403ef0814a2c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TIOCGRS485(r3, 0x542e, &(0x7f0000000040)) 16:41:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) [ 1342.031040][T31382] usb usb9: usbfs: process 31382 (syz-executor.5) did not claim interface 0 before use 16:41:12 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:12 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x999170b38220f574, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:12 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000924a60d27400"], 0x0) [ 1342.339574][T31679] vhci_hcd: default hub control req: 7403 v0000 i0000 l0 16:41:12 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:12 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x8, 0x1}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000000100)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x2, 0x0, &(0x7f00000003c0), 0x8, &(0x7f0000000500)) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x1) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, 0x0, r8, 0x0, 0x2, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:12 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@isdn, &(0x7f0000000040)=0x80) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/slabinfo\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r4, 0x40184152, &(0x7f0000000380)={0x0, &(0x7f0000000340)=[&(0x7f00000004c0)="ecb52cc75d1ea3086c2fc5ae5d3b02dd87c51ee8a3492976f1f6e605f039abb88b5befaa69f5dbd9672b525cdcd73387a63e8b15e53166753aa41d14aeb41b355024c550b8d469fe36cf506ca0268a1c0a5a8683d6bdb20c6fa1f20485afeccf49a201bb9bf376d3bc224c1045d25e52c774bb2588aec27a062a3595f7740ebbcca95911485c7f6c1daeeb07bfca9b2940bc3fbe8e988c5b783164cae8c0a6b21e231b5eb54fbad93e1f72c1488e686f35cc53b5a10b82fa4c885ca8266dde3e2d72bee9f3669e", &(0x7f0000000300)="ddc346e1a135c93d7449d4017890635c97e63a96889731d9b68c787b8d98735e81ef6c6f27d962"]}) r5 = fcntl$dupfd(r2, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001600)=@newtfilter={0x11e8, 0x2c, 0xd27, 0x2, 0x0, {0x0, 0x0, 0x0, r10, {}, {}, {0xf}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x11b4, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x7, 0xb}}, @TCA_MATCHALL_ACT={0x11a0, 0x2, [@m_nat={0x103c, 0x3adf, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xffffffff, 0x3, 0x3, 0x8, 0x1}, @multicast2, @remote, 0xffffff00}}]}, {0x1004, 0x6, "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"}}}, @m_ct={0xac, 0x1c, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e24}, @TCA_CT_ZONE={0x6, 0x4, 0x5bd3}, @TCA_CT_LABELS_MASK={0x14, 0x8, "98aec566584913d112842385ce258c0e"}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x4}, @TCA_CT_ZONE={0x6, 0x4, 0x9}]}, {0x60, 0x6, "b2a23c303fcc03f584293376c8a75a05a444eb93b9f463b0d75012a0db210fc48223cc6b6d56d87626d63a09f9a8ff9a0d57a781a8ca0e7e95836a18ec9437340c365db075b81da4b43d98e64d788b667255d611546eb46b451d5f95"}}}, @m_connmark={0xb4, 0x1b, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7ff, 0x2, 0x1, 0x2, 0x5}, 0x8}}]}, {0x7f, 0x6, "4c1825dd07b15359bf11f67619d50f9680148f636d2d0efa5f6a233f4a9ea5a6a053ef994ec458d3c33c6cf97425624b1deb9e67df99472f355ae4c7cc580b2b9c7ca91562fd31b9e1766939b52a9cec25e9eeddf5ad97f1f6e0ec4af01070c7070110d1763009ddeceb454f3ec99f60fa801137ce38de7a0735fc"}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x8}]}}]}, 0x11e8}}, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000240)={r10, 0x1, 0x6, @dev={[], 0xa}}, 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000140)={0x0, 0xe117, 0x0, 0x829a, 0x7}, &(0x7f0000000180)=0x18) r12 = socket$inet(0x2, 0x2, 0x0) bind$inet(r12, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r12, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r12, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) write$FUSE_NOTIFY_INVAL_ENTRY(r14, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r11, 0x7}, &(0x7f0000000200)=0x8) [ 1342.419225][ T23] kauditd_printk_skb: 70 callbacks suppressed [ 1342.419242][ T23] audit: type=1400 audit(1579970472.284:2089): avc: denied { open } for pid=31696 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:12 executing program 1: chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x260600, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f00000000c0)={0xff9f, 0x2, 0x7}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1342.537286][ T23] audit: type=1400 audit(1579970472.374:2090): avc: denied { open } for pid=31696 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1342.593127][T31706] usb usb9: usbfs: process 31706 (syz-executor.5) did not claim interface 0 before use 16:41:12 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1342.633634][ T23] audit: type=1400 audit(1579970472.384:2091): avc: denied { open } for pid=31700 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1342.734891][ T23] audit: type=1400 audit(1579970472.434:2092): avc: denied { open } for pid=31699 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:12 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffeeb, 0xfffffffffffffffa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:12 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7a, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e22, 0x8, @mcast1, 0x8}}, 0x8, 0x8305, 0x6, 0x5, 0x24, 0x4, 0xb7}, &(0x7f0000000040)=0x9c) r4 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:12 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x101001, 0x0) open_by_handle_at(r0, &(0x7f0000000080)={0x8}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000040)) 16:41:12 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1342.851429][ T23] audit: type=1400 audit(1579970472.604:2093): avc: denied { open } for pid=31797 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1342.955451][ T23] audit: type=1400 audit(1579970472.644:2094): avc: denied { open } for pid=31797 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1343.003132][T32017] usb usb9: usbfs: process 32017 (syz-executor.5) did not claim interface 0 before use [ 1343.015160][T32043] Unknown ioctl 8829 [ 1343.026003][ T23] audit: type=1400 audit(1579970472.654:2095): avc: denied { open } for pid=31882 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1343.076342][ T23] audit: type=1400 audit(1579970472.754:2096): avc: denied { open } for pid=32013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1343.127632][ T23] audit: type=1400 audit(1579970472.824:2097): avc: denied { open } for pid=32016 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:13 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) write$fb(r2, &(0x7f0000000340)="6a616b46409423b3499130f9f3fea02f9ba1b669e8b874fbfe034555fbec9b7ef1dbd0631520ab389eed9a8368c2443dad1a2016efeeb99c3760a6b1e333318f3b02dd263b000e2f8cce8a4e91e274850c9f9143c3f747f9d3c3f6b8343b03", 0x5f) 16:41:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x8}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x800, 0x9}]}, 0xc, 0x0) 16:41:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x40200) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e20, 0x1, @rand_addr="0c9d7dc67bef11b6ff1f0fc2d1f6e641", 0x400}, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x3b}, 0x5}, 0x401, [0x800, 0x10001, 0x1ff, 0x9, 0x9, 0x4, 0x3, 0x9]}, 0x5c) [ 1343.232742][ T23] audit: type=1400 audit(1579970472.854:2098): avc: denied { open } for pid=32016 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1343.346525][T32480] usb usb9: usbfs: process 32480 (syz-executor.5) did not claim interface 0 before use 16:41:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000080)={0x0, 0x2, 0x4, 0x1, 0xc0e3, {}, {0x3, 0xc, 0x3, 0x4, 0x20, 0x19}, 0x0, 0x4, @planes=&(0x7f0000000040)={0x0, 0x0, @mem_offset=0xfc1, 0x7d}, 0x1, 0x0, r0}) setsockopt$inet_tcp_int(r3, 0x6, 0x24, &(0x7f0000000100)=0x7fff, 0x4) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1343.408175][T32480] usb usb9: usbfs: process 32480 (syz-executor.5) did not claim interface 0 before use [ 1343.549968][ T2958] FS-Cache: Duplicate cookie detected [ 1343.555854][ T2958] FS-Cache: O-cookie c=000000000820909a [p=00000000fcde1ae6 fl=222 nc=0 na=1] [ 1343.565129][ T2958] FS-Cache: O-cookie d=00000000b513106a n=00000000b513106a [ 1343.572373][ T2958] FS-Cache: O-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' [ 1343.585331][ T2958] FS-Cache: N-cookie c=000000003d39e4f4 [p=00000000fcde1ae6 fl=2 nc=0 na=1] 16:41:13 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c004a000100007a42ae05fad85ebd42197f9fcb9fc54898800000000000000096d636e962291864b4a09e2f9ad471422766476e"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="0800000001000000ec88c77d140ec882cc8b2a01eb6853511e885f6b37c55f4b13f7914ad57fea56aa1647988b808946b6673f326981ecc154c0041f271eb1398a7104fdffaceded6258907bcf7d271a5189136f3a4485a5bc6fdb2769d04c57aa35f39371f93d9af1923b7bef00"/120], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1343.594048][ T2958] FS-Cache: N-cookie d=00000000f0b34d4d n=00000000c4a0f7b5 [ 1343.601424][ T2958] FS-Cache: N-key=[48] '9afe665d75776f2c22b91663f06163fdb58295b45bb21824f09335787eb573fe26e6a174777df9aa997a15ba63701228' 16:41:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendmmsg$sock(r5, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc801) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0xa1, 0xe, 0x0, 0x0, 0x0, 0xfffffffc, 0x0}) 16:41:13 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x76bc81, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1343.789559][ T409] usb usb9: usbfs: process 409 (syz-executor.5) did not claim interface 0 before use 16:41:13 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x13) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x7c1362, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:13 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000280)={0xffffffd1, 0x1, "06758824861b35a21675d199ad6330ef61b74e2a1fa1d51357806fded73110edcbdfb3982f28ad1a72e9662abafae8366626"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0800020000e0ff00"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r8, 0x112, 0xd, 0x0, &(0x7f00000001c0)) accept4(r8, &(0x7f0000000340)=@rc={0x1f, @fixed}, &(0x7f00000000c0)=0x80, 0x1000) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r9, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1344.008862][ T492] usb usb9: usbfs: process 492 (syz-executor.5) did not claim interface 0 before use 16:41:13 executing program 2: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80040, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r0, 0x14, 0x3}, 0x10) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) sync() 16:41:14 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x501041, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x4, 0x0, 0x3, 0x5}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x100000001, r2, 0x2, 0x7}) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2c00000018020000000000000000000000000000000000000b0000000000110047504c656d303a6264657600"], 0x2c) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f00000001c0)={0x8001, 0x0, 0x1, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000140)={0x102, r6, 0x10001, 0xa8}) 16:41:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5a3, 0x80000) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r2 = dup(r1) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000001c0)=""/4096) 16:41:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1344.326505][ T702] usb usb9: usbfs: process 702 (syz-executor.5) did not claim interface 0 before use 16:41:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x16, 0x0, 0x9, 0x2, 0x0, 0x70bd2c, 0x25dfdbfd}, 0x10}}, 0x10) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, &(0x7f0000000040)) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0x20010, r1, 0x100) r2 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1344.491285][ T905] kAFS: No cell specified 16:41:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 1: sendto$llc(0xffffffffffffffff, &(0x7f0000000080)="8d63a3b88ad5d35c3d986ee5d652868849ae11cbdb949f927358aaa6b96ab82073cba9d0840dcc3d00f57ea75b3ab9fb12c30b91c3f0bb86d2b507365ed94e616930914b36f9e750c291ee1166754934a8a6a1eab2830680bbd56512610b1bb7af18e44d9d5f5987e5b0", 0x6a, 0x20008800, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:14 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050300000000000000cd000000000000ffffffff0000000004000000000000000600000000000000000000000000000000000000000000000000000000000000050000000300000000000000bcdbb00400000000000000d10d000000000000ff03000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3e0081e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d31887a5289f95da475788f01e0e96e89356d3326d51448877dd7adb1a6ab98086eafb5bad"]) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000100)={0x0, 0x7ff, 0x9, r1, 0x0, &(0x7f00000000c0)={0x9b0970, 0x81, [], @p_u16=&(0x7f0000000040)=0x8}}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000140)) [ 1344.701221][ T1080] kAFS: No cell specified 16:41:14 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80, 0x0) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f00000000c0)) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000240)={0x7, 0x1}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f00000003c0)={0x8, 0x7, 0x4, 0x20000000, 0x8001, {}, {0x2, 0x1, 0xbc, 0x0, 0x5, 0x2, "0b00b3e9"}, 0x80, 0x1, @offset=0x80000000, 0x3dc, 0x0, r7}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r9, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x44, r10, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r8, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)={0x68, r10, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x68}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3c}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xb5}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcaa}]}, 0x68}, 0x1, 0x0, 0x0, 0x50}, 0xc010) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r11 = socket$inet(0x2, 0x2, 0x0) bind$inet(r11, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r11, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(r13, 0x4140, 0x0) connect$inet(r11, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r14 = socket$inet_tcp(0x2, 0x1, 0x0) r15 = fcntl$dupfd(r11, 0x0, r14) write$FUSE_NOTIFY_INVAL_ENTRY(r15, &(0x7f0000000040)=ANY=[@ANYBLOB="2c0000efff000000000000000000000000000000000036000b0000000000000047504c6569303a6264657600"], 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r16) r17 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x20, 0x0) ioctl$LOOP_SET_STATUS64(r17, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "c55280a8eadb0737a703657fe4853fed30b0392269b38002df4444306a8744e86fbfd59015bcb6b7d07aefd90018304687fb0afd04175cbffedffc46ee5199c7", "602a95267fd2a488fe2aa8e8b4c5e26ef1ce8704e960c19416c198d344756c9bcbc23961697338c3b36058f722ff5367795ee604818fe04496590c35c8ae71e9", "5b059728def85a01256af697cc66b0ff98859ff357fe9358f88c7ad61b17e24f"}) ioctl$LOOP_GET_STATUS(r17, 0x4c03, &(0x7f0000000300)) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x1, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) r9 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xaa642, 0x0) ioctl$PPPIOCATTACH(r9, 0x4004743d, &(0x7f0000000280)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_RELEASEINTERFACE(r0, 0x80045510, &(0x7f0000000040)=0x22dd) 16:41:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:14 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x84, 0x18, 0x0, 0x7f, 0x0, 0x0, 0x0}) [ 1344.992347][ T1342] kAFS: No cell specified 16:41:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="2c0000000300000000000b0000000000000047504c656d303a62646576000000000000000000000000000000b8808f19c8c7c925ca98cef53ecc3e4c5eeb8324734d2c674f0d6291fa447af67bfd2142f5cd22b1"], 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r3, 0x0, 0x2, &(0x7f0000000100)='*\x00', 0xffffffffffffffff}, 0x30) r6 = socket$inet(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r6, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r6, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) write$FUSE_NOTIFY_INVAL_ENTRY(r8, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x4, 0xdd, 0x6, 0x2, 0x0, 0x10000, 0x40020, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x2, 0xffffffffffff0001, 0x2b, 0x5, 0x80000001, 0x482e347, 0xf801}, r5, 0x3, r8, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r9, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000240)={@broadcast, @loopback, r10}, 0xc) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000002000000"], 0x0) 16:41:14 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1345.143633][ T1435] usb usb9: usbfs: process 1435 (syz-executor.5) did not claim interface 0 before use [ 1345.199721][ T1435] usb usb9: usbfs: process 1435 (syz-executor.5) did not claim interface 0 before use 16:41:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000280)={@fixed={[], 0x10}, 0x7fff}) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r4 = open(0x0, 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)={0x8, 0x1}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r8, r8, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x1, 0x2}, 0x10) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r10, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f0000000340), 0x20000000, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r7, 0x0, r8, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r9, r10, 0x5}) openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x40, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r7, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1345.252376][ T1531] kAFS: Bad value for 'source' 16:41:15 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) 16:41:15 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x0) 16:41:15 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000140)={{0x7, 0x2, 0x0, 0x8, 'syz1\x00', 0x5}, 0x4, 0x30, 0x3, r3, 0x8, 0x6, 'syz1\x00', &(0x7f00000000c0)=['/dev/bus/usb/00#/00#\x00', '/dev/bus/usb/00#/00#\x00', '[!}\x00', '/dev/bus/usb/00#/00#\x00', '[@\x00', '\xb4\x00', '.&{posix_acl_access\x00', '/dev/bus/usb/00#/00#\x00'], 0x71, [], [0x2, 0x3ff, 0x81, 0x1]}) 16:41:15 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f00000004c0)={0x6, 0x7, 'syz0\x00'}, &(0x7f0000000500)=0x28) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r3) recvmmsg(r2, &(0x7f0000007a00)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x48, &(0x7f0000000280)=[@in6={0xa, 0x4e22, 0xf7, @empty, 0x9}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e21, 0xfffffeff, @mcast2, 0x9}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000380)={r6, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x286208ae, 0x3, 0x8001, 0x9, 0x12, 0x0, 0x4}, &(0x7f0000000440)=0x9c) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x3ff, @rand_addr="88d2166e01c4bfcc9b252dbb7043c404", 0xfff}}, [0x401, 0x3ff, 0x6, 0x400, 0x5, 0x0, 0x7fffffff, 0x0, 0x100000000, 0x5, 0x2, 0x100000001, 0x9, 0x4, 0x10000]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r7, 0x2c, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e22, 0x663, @empty, 0x5}]}, &(0x7f0000000240)=0x10) r8 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000005c0)={'team_slave_1\x00', &(0x7f0000000540)=@ethtool_regs={0x4, 0x3, 0x56, "f2b86cb853f4b81a3ea3d5dd4c5e79d5483dda44c6bc9a4f6b13772739a1e107466b05382688621c4413914a91ff48725adf275a1290bd15652bd30a26cd58a45984da7ffdf4c3323100d13e7a27a407c5239de79e60"}}) ioctl$USBDEVFS_CONTROL(r8, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1345.487338][ T1703] kAFS: Bad value for 'source' 16:41:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:15 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1345.573597][ T1757] usb usb9: usbfs: process 1757 (syz-executor.5) did not claim interface 0 before use 16:41:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r9, 0x800000c004500a, &(0x7f0000000300)) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r7, @ANYRES32], @ANYRESOCT, @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x5}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1345.703692][ T1845] kAFS: Bad value for 'source' 16:41:15 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x2e0f83, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x90a00, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, 0x3, 0x8, 0x5, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1b}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_TCP_CLOSE={0x8, 0x8, 0x1, 0x0, 0xa3}, @CTA_TIMEOUT_TCP_TIME_WAIT={0x8, 0x7, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x200000c0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001740)='/dev/btrfs-control\x00', 0x4080, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f0000001880)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x400004}, 0xc, &(0x7f0000001840)={&(0x7f00000017c0)={0x64, 0x1, 0x4, 0x801, 0x0, 0x0, {0x9, 0x0, 0x4}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0xfffff3df}}, @NFULA_CFG_MODE={0xa, 0x2, {0xfac}}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x1ff}, @NFULA_CFG_MODE={0xa, 0x2, {0x5}}, @NFULA_CFG_MODE={0xa, 0x2, {0x4}}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x2}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x2000c000}, 0x20000000) 16:41:15 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = dup3(r1, r0, 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xe) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2c000000e4000000000000000000000000000000000000000b0000000000000047504c656d303a6264657600"], 0x2c) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x7ff) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x5, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0}) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000040)) 16:41:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:15 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1345.833504][ T1911] usb usb9: usbfs: process 1911 (syz-executor.5) did not claim interface 0 before use [ 1345.928171][ T1952] kAFS: Bad value for 'source' 16:41:15 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:15 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x100) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x4ce, 0x5, 0x4, 0x70000, 0xfffffff8, {r3, r4/1000+10000}, {0x3, 0xc, 0x1, 0x1, 0x3f, 0x80, "c79491d3"}, 0x400, 0x3, @offset=0x6, 0x5, 0x0, r5}) sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0xfffffffffffffeba, 0x9, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x5c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xfff}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x0, 0x1c, 0x1, 0x0, 0xffff}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x40100000000}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x0, 0x15, 0x7}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x11}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r7 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$rxrpc(0x21, 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000340)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r10, &(0x7f00000017c0), 0x1d0, 0x0) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000080)={0xa1, 0x18, 0x0, 0x3, 0x0, 0x0, 0x0}) 16:41:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x8, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000c00)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e00000000006a5b984593ed588d3dcded37ce02dae1d7666b9541b8042be8b2930323e1445fa029772fb66ccb46eb5cc72fbb9a472e9205352aaee9dbb61fcc9188f139c471078de3", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) r9 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r10, 0x800000c004500a, &(0x7f0000000300)) dup2(r10, r9) prctl$PR_GET_SECCOMP(0x15) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r11, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x44, r12, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x44}}, 0x0) 16:41:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1346.125409][ T2222] kAFS: Bad value for 'source' 16:41:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x3e, "853e44da3370a2a217b152dac9d00be3da5993c0d0e2c696b0d672adbbdb1e71223d5f3493406e9c8d0c287b2cb6f0f86c8eeed26ba56ca88bb4f0303976"}, &(0x7f0000000040)=0x46) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={r2, 0x1}, 0x8) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) 16:41:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) r2 = add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, r1) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/nfsfs\x00') r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000140)={r7, 0xb50d, 0xfffffe00}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, r2) r8 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$negate(0xd, 0x0, 0x9, r8) [ 1346.320586][ T2238] kAFS: Bad value for 'source' 16:41:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000380)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x3, 0x1, 0x9, 0x1}) r1 = syz_open_dev$usbfs(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x77, 0x20100) bind$phonet(r0, &(0x7f0000000340)={0x23, 0x3, 0x5, 0x1}, 0x10) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_SG_FREE(r5, 0x40106439, &(0x7f0000000000)={0x2}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25SDTEFACILITIES(r6, 0x89eb, &(0x7f00000002c0)={0x1000, 0x3, 0x101, 0xfb, 0x7f, 0xa, 0x1d, "28516e184d812a157db47ce4d1e186532c7fd025", "2aba1489077cf1273bfd20717d82c8764f26585b"}) sendto$isdn(r2, &(0x7f0000000240)={0x3, 0x769b, "6abea22bc06f6be9b7f492c24c8ef845ef6ae88f5b20b10be762a80eced208950a60"}, 0x2a, 0x40880, &(0x7f0000000280)={0x22, 0x8, 0xf0, 0x9, 0x5}, 0x6) 16:41:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5b800000000, 0xfffffffffffffbff}, 0x10010, 0x6, 0x0, 0x5, 0x0, 0x9}, 0x0, 0xffffffffffdfffff, r1, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r3, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r4 = open(0x0, 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000000)={0x8, 0x1}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r1, 0x406, r3) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x3, &(0x7f0000000340)=[{&(0x7f0000000440)="1805cc98807d155e0fe97ddcc3e5fa847932d0520ae57c2a0048fd226558b483a6b338a4d7403c3d9c93d28cb2289edec848a5b8f35eafe4fdf057de7312ec6faa2b28b33dfe4a1b54ee82569337f6bfe1357dcaae945e398737efd1d3d1220bb2d39771262198b2d861793bc0b3180dc17b6148af714eba7df408a75fa985af87190158c254a18ece312d9b8770d01972a89ab2bcf50cbbc210e7276bf6b7e98179fb59c2bf94653825", 0xaa, 0x879}, {&(0x7f0000001740)="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", 0x1000, 0x8}, {&(0x7f0000000500)="c53ddb25eeaa1b298664a26c6afd2b0f8d1ecee98147f72e75ba5e13ce865c386270477145db34ea302b411898e9103269ed1d507fd0982b5be3cb08ccf6b18c65b444d77c850f2d66a2b2beed5063a3de6cc9a61de3f3fbd05fdd2693e58054c4391d22ca169213d4f431515e3c143b8ab4648006177f702fc7da0fc224e4c546f6c5998f32d6607b31aa20278a95a13c50e28d92efec891e58d9d9b688e492d063055f136e778f85501303ca0fb1a37b856d566e8e572b2036a2759c00b608215e570f2d65d02f3b183071f64f", 0xce, 0xffffffffffffffff}], 0x1002, 0x0) 16:41:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), &(0x7f00000000c0)=0x8) [ 1346.562920][ T2439] kAFS: No cell specified 16:41:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x100, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400203) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000040)=[0x9, 0x8000, 0x38f, 0xa08, 0x1, 0x502c, 0x3f, 0xfffffff7], 0x8, 0xedd, 0x3, 0x3, 0x7, 0x8, 0xd88, {0x10000, 0x2, 0x7, 0x180, 0x80, 0x8, 0x7, 0x8, 0x4, 0x4, 0x5, 0x9, 0x80, 0x5, "6703d63a2e4b6467ca8a33befa7887802f420603fced9a7a67ec67943bd6b198"}}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r7, 0x10e, 0x8, &(0x7f0000000140)=0x40ef, 0x4) fcntl$setflags(r0, 0x2, 0x0) r8 = semget$private(0x0, 0x4000000009, 0x0) semop(r8, &(0x7f0000000380)=[{0x1, 0xffff}, {}], 0x2) semop(r8, &(0x7f0000000380), 0x1d) semop(r8, &(0x7f0000000480)=[{0x1, 0x3}], 0x1) semctl$SEM_INFO(r8, 0x4, 0x13, &(0x7f00000004c0)=""/4096) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) [ 1346.804396][ T2697] kAFS: No cell specified 16:41:16 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) getpeername(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000040)=0x80) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) 16:41:16 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="090000000102000016"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000010000e6a58dec04cb4bb92079576e2d0d447e1c5d66ae9a84d4b1f0ddd49bdec6e62809267723"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="db31c818288ebafd5737385039e73cc52a3a0ac4ea5cee73f28635215f2e10299ff4e8afb810599dd8241bc4f1d2a232b22e157c737ba733f2286df62ee3b50e82d0c2ea450d1022a0d98084d7676db22cd4f329dc42a69bb1bfbc93a079b81c8a44c6dbaf3f592df21cbed0d49f1a8287da8dcd4d7a512da78f3ac2a692cc1a748877a4c2e2c45b22edfcb6c3498dbfb562a64ba9cf01b480ec85a4ceba1fe9ef5b7c442baadb217ff7b0ce305173fc4022a3bc54d384169a69c77255c279936cf158f9fb435118372123d53d7a6d0ffe7dc52246df975594dbc863abcf4cea52ead09ddf822ebf40c039055735d5f25eebc1ffdd2c76b550b431beb8d895c4fc070b45fe2b38126b455308652ccc0ad5543e9372a68cb4600b4ce0505f539399931f1c3d0c939615970182e955a01a04004300cd8b7d1ff057682dd26010ef687717fb53b2ce5fdc294c23597377d5124a34538f02de7ab28db0bac4ec5cbeb4e0aedf565506b84830e4c7618b9b6a880f3d5747a9aa200ed3e8687ea1455c2b507917c4bc0008002400dbcb6f139e2ff93467d1197bd105aee69fdb6524c60fbea74aaf735f0b524da50c2e9bddb69c184459046ed73a83ae9047d7bb1ecb1042b3185af4fc51f9216efbde5a57c1bcc6dbb85ff7c64f212a881bb4291d364d17955e3cd2511ec6e5b41735b35e7b6d06bf11e65a48486340a40b88c3488e0000000000", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1346.922779][ T2767] usb usb9: usbfs: process 2767 (syz-executor.5) did not claim interface 0 before use 16:41:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.070086][ T2891] kAFS: No cell specified 16:41:17 executing program 4: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0xffff, 0x0, 0x3, 0x0}) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000100)={0x1, 0x3, 0x1000, 0x2f, &(0x7f0000000040)="d779b3a937ce481077f26589c55fff4fc768356d3a019242ec43cf076b5d79230fa8a62ca0dafb2cfabf650ca3ecba", 0x12, 0x0, &(0x7f00000000c0)="871fdc4747d9980e8e8f900da5678f668f05"}) 16:41:17 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x5, 0xba50, 0x0, 0x10001, 0x9, 0x0, 0x100, 0xffffffff, 0xffffffc0, 0xe6, 0x7fff, 0x10001, 0x5, 0x9, 0x7, 0xffffdd2a, 0x0, 0x81, 0x3, 0x7, 0xe95e, 0x8, 0x0, 0xc1, 0xc50, 0x5cf1, 0x80000001, 0x1, 0x0, 0x9, 0x4, 0x200]}) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$USBDEVFS_RESETEP(r5, 0x80045503, &(0x7f0000000040)={0x9, 0x1}) 16:41:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:17 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.258633][ T3101] usb usb9: usbfs: process 3101 (syz-executor.5) did not claim interface 0 before use [ 1347.278289][ T3126] kAFS: No cell specified 16:41:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000100)) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/checkreqprot\x00', 0xc00, 0x0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x40, 0x9, &(0x7f0000001680)=[{&(0x7f00000001c0)="d03d0c88744b18d3b8c83a4bdc41ffa90bff052c184592c5ae0f998ed75311ad20c26850da077a6d0aed35b1080bd4f8f82cf79666f23e175fbb88ccc66354a60ee1f1bebc7978514fee7a7e04fbce7daa4dbe85c32870f43b0ee41731ba51371715039bf5", 0x65, 0x2}, {&(0x7f0000000240)="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", 0xfd}, {&(0x7f0000000340)="dd47377d977845b6dd54e45d5817f34e770d21485de435adf77b0f", 0x1b}, {&(0x7f0000000380)="b84ea5f13895fcbda92dddf39b90a4c33afd42c5c3ad1ad61269798cb16e5e3be4a3a1794627fad44753fe5d1d0afe73886abd2c0c97a6a60b139e423ba0bf6b", 0x40, 0x1000}, {&(0x7f00000003c0)="9209d00e6965d0a8422bf74c7e719d134d5fba33b940e38e32448ee5786304c1dacd2fa038ed8370b5a858564bdbd61ac91f7209237adad640f8c9d0ce4c4feaedcf31800150115f38dc6a42cb1a67b85c427660e8853b0695f249798a419b3cf02c38be9a9d978857ddb650b18fadac431c49a9fe3258fb28e1deff5f13348a07cab9dc9b6aedb86e", 0x89, 0xff}, {&(0x7f0000000480)="bc75c0ea3ff5d651fc3bcb200e19c24d018c68de4597128512e550a31306ed692d0feb7a6ea4883a9bfb95687f47d50c738e5ff764fe75c71d438784763cae29ac7145dd6348fd25b2b9febcffed4423cac3c88462d7d9a2b3a21b554ad11d37", 0x60, 0x80000000}, {&(0x7f0000000500)="da77761c453a0254743508620ba2cb68daf20e6465f80e3faf955410fa6599f9f92d722012e7d5407a4d780ec0fe5756a93677f028e23dac520c6e908634138757274d41c6dd28d279b127edbc50737ae7a4a43521ecb3291f5e440977f7860b1577aafa8c71fdb8caffa7af143801469dd6a4eec89195382b83a4479df4f36e72144439f1d804652b7547e3c1b752489ae8bafa391dea2fc64a18d8f228f90db9b1d70caa98141d02f36a8c840abfde26413272841fa67cf8782c5905f96c1ea294f3740b84f3c9", 0xc8}, {&(0x7f0000000600)="020cb8b0f1ee454dd7a06f8ef0779b5bf27a286e9496f979de96ab0e9b6fb37341c32e89a6f9de236ce6a10fbcdf6e51e869806f3aa82a352b687229eef9fdcb3376d1f285c66322536ae775c1b0b19403fed6b0b89243eca9cf54588f0d3c2a5ca6140385898b7486aed9895db161789d7ea30a", 0x74, 0x3}, {&(0x7f0000000680)="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", 0x1000, 0x80000000}], 0x1022081, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040)={0xa, {0x5, 0x9, 0x1f}}, 0xa) 16:41:17 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="b4f2cafbb89f40e857d0089170bec945d2bab00ef30692904c8f2fbf6f150b2b93ac93e201d24fc235d005aba3040e0006abf06ede4cfc90b4a5e25ad3886fc7a5178ef513e1de51e86a488d0c26109d48052eb715b23fc2387665e90f8a57c8837b0cc099a44b5c80c745e7a4b9d37a08c2286892a62af7b59393a33608098623961ee9a90d261ae5607a1bf4c5b4151e7d985084913b084ad70da8bd082e513bd959c2b3c37ea406371669", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r5, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x3, 0x400, 0x200, 0x1ff, 0x7fff}, &(0x7f00000001c0)=0x98) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000200)={0x0, 0x2}) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r1, 0x0, r6) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2cfad6051d6dc23200004003080000000484857fdc3f0a3847504c656d303a6264657600"], 0x2c) ioctl$SIOCAX25GETINFOOLD(r7, 0x89e9, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r8) ioprio_set$uid(0x3, r8, 0x1) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x2562c2) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0}) 16:41:17 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.474988][ T3295] kAFS: No cell specified 16:41:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x201, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000000"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x800000c004500a, &(0x7f0000000300)) read(r4, &(0x7f0000000440)=""/155, 0x9b) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r7, r7, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TIOCMBIC(r9, 0x5417, &(0x7f00000000c0)=0x1f) r10 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r11 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r11, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r10, r11, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:17 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.629967][ T3308] usb usb9: usbfs: process 3308 (syz-executor.5) did not claim interface 0 before use [ 1347.678497][ T3411] kAFS: No cell specified 16:41:17 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) poll(&(0x7f00000000c0)=[{r0, 0x4000}, {r2, 0x8020}], 0x2, 0x4) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) connect$netlink(r4, &(0x7f0000000040)=@unspec, 0xc) [ 1347.712279][ T23] kauditd_printk_skb: 36 callbacks suppressed [ 1347.712296][ T23] audit: type=1400 audit(1579970477.574:2135): avc: denied { open } for pid=3412 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:17 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1347.901968][ T3662] kAFS: No cell specified 16:41:17 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0900000001000000165cb643275b030300c6906dece08e56e0000e02360911ed1063a6f9004f201dc0a9c01b7def64a826"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) r9 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r9, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, r9, &(0x7f0000000440), 0x40000000, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000140)="9ec6076a200a944724c0861fb9536d3896024f53e3ff8e188633a5cf8a20666429bc91bce8eb6dbee5f98ce955208b7e98d89682912920affe5348b70120b6f3d54b179e92a1b72818b5af1b66e684f24af7a7ba532fcb3fb52445be03a61a40c0f6fbe27efe18e17b70062297a67ce0bf645839b9f0f802a0536aba4f0f6e6120645502eef24da48193ad439b743d3b0e7896153bec1cdefa26bd28e3b9ec") ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000000c0)={r2, 0x1}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x473, 0x2000) r3 = syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x40000000000077, 0x6a001) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1348.002723][ T23] audit: type=1400 audit(1579970477.874:2136): avc: denied { open } for pid=3730 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:17 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:17 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDCTL_DSP_SETFMT(r2, 0xc0045005, &(0x7f00000000c0)=0x378) sendto$phonet(r1, &(0x7f0000000100)="de0a005479b672e84d173fdc23cdd827e13df1042cd7eb2147dfae61abc4adf6b618633459d5888446d4057c21de7fa0207dede09ee6e5e46f2c7a566e17209ac9b5389a8a17c5977c0feabd2a9c5e07810c6fc91a0a4c6b08bb4fc6baedee1d023b3dc0503836969e3b54f8cf3ffbaa430ab715f471b93b661126557aed2813a6e36c4435c1d80c26fca264e02e9ed1244785fd028d7f582a53f70e474813ddb7b6e7dc5721a7951a", 0xa9, 0x10, &(0x7f00000001c0)={0x23, 0x2, 0x7, 0x7}, 0x10) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1348.054019][ T3790] kAFS: No cell specified 16:41:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xd, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000000c0)={0x6, 'veth1_to_batadv\x00', {0x4}, 0x3}) r4 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TIOCGRS485(r4, 0x542e, &(0x7f0000000040)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x6, 0xfff, 0x2, 0x0, 0x20000008, 0x0}) 16:41:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket$inet(0x2, 0x2, 0x0) bind$inet(r11, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r11, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r11, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r12 = socket$inet_tcp(0x2, 0x1, 0x0) r13 = fcntl$dupfd(r11, 0x0, r12) write$FUSE_NOTIFY_INVAL_ENTRY(r13, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$NS_GET_OWNER_UID(r13, 0xb704, &(0x7f00000000c0)=0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) setresuid(r10, r14, r15) [ 1348.263132][ T3891] usb usb9: usbfs: process 3891 (syz-executor.5) did not claim interface 2 before use [ 1348.288285][ T3955] kAFS: No cell specified [ 1348.332752][ T3993] kAFS: No cell specified 16:41:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = request_key(&(0x7f0000000040)='ceph\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) keyctl$chown(0x4, r1, 0xffffffffffffffff, r3) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1348.427826][ T23] audit: type=1400 audit(1579970478.294:2137): avc: denied { open } for pid=4051 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x303080) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000100)={0x3, 0x40, 0x2, @remote, 'virt_wifi0\x00'}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x2, 0x0, 0x101, 0x1, {0x1, 0x3, 0xed50, 0x1}}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000180)={'veth1_virt_wifi\x00', {0x2, 0x4e20, @remote}}) [ 1348.483480][ T4116] kAFS: No cell specified 16:41:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1348.599854][ T4192] kAFS: No cell specified 16:41:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0xa) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000e8ad4350f0dda96b5b3704f1ae2efba06bb4755c42dc7b6bcc079b9b0df992e5085ec80f2bac1e4687d6c742f698156644f7ab4916c0b8e2277b3528691b05234e344852a3f92f03795defdd2348e2be52e2d264a90cc0871c4f6480e6aa73ba50ba6c3c39d246de50cc6a1d37c0b5d06bbbbac2f4e15fa2ab21804ace50b26caac88aead52cfe2932d6927fada0438fbdffa1d8e918318b8348d449c407f491b38f6aaae020aec080b8c866ce7b75e6dc0242b333de33e1144783a308b4cd10936195da27dc2edbdbf6c60e8afc172be3"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) setresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r4, r4, 0x0) r5 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x6, 0x80000001, 0x1, 0x5, 0x6, 0x7}) r6 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r6, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, 0x0, 0x0, r4, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r5, r6, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0d9b0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c3343a4937719cd859e073806e32b00308005300e00000029701788008005b00", @ANYRES32, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:18 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1348.690062][ T4279] kAFS: No cell specified 16:41:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x10000077, 0x10001) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x6181, 0x7, 0x4, 0x200000, 0x3, {r1, r2/1000+30000}, {0x0, 0x2, 0x5, 0x94, 0xff, 0x81, "81c5c59d"}, 0x5, 0x4, @planes=&(0x7f0000000040)={0x1, 0x1ff, @fd, 0x3}, 0xd675, 0x0, 0xffffffffffffffff}) write$selinux_access(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7379736c6f67645f7661725f6c69625f743a7330202f7573722f7362696e2f63d17ddcaf20303030303030303030303030303030323731383000"], 0x4c) [ 1348.756973][ T23] audit: type=1400 audit(1579970478.624:2138): avc: denied { open } for pid=4324 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, r1) [ 1348.813151][ T4332] kAFS: No cell specified [ 1348.916860][ T4383] kAFS: No cell specified 16:41:18 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1348.958042][ T23] audit: type=1400 audit(1579970478.824:2139): avc: denied { open } for pid=4350 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:18 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="bb9742af0100000016"], 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0800000001002400"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b0400000000000000d05d5352ba422ee6ebbd0000000000000000745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) 16:41:18 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x140c3) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3) [ 1349.118779][ T4631] kAFS: Bad value for 'source' [ 1349.152150][ T23] audit: type=1400 audit(1579970479.024:2140): avc: denied { open } for pid=4636 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x76, 0x181) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="2fcf25e60e744ff04feeb819ebb6af320f2bf44ec04fdae480ed41d3a456ae7a507e6792f18187832654d79c53f45583faa5043bf9bcf609601382e413f168795e40b75283d866ed46795ab90f6d1094e065282e245c63f94489a761bb79c640e4618f3e461a160467a84a08eb19256f5faa877b3c", 0x75}, {&(0x7f00000002c0)="838c7461704b41b3486a6a6273d11ae1b2b859bb36b071f495db65ce4049af1664c387d9966d1bd2f40506a679fba65a416fe711447caf4f7829b58a610f6bfb336a3b6ae5357631bc9b84454c9efa4cdecdee482290676fefb56e9ee706615e6c32f4643962c789e3791253", 0x6c}], 0x3}, 0x4004000) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsa\x00', 0x80040, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f00000003c0)={0x0, 0x7f}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x80000000, 0x1ff, 0xdb, &(0x7f00000000c0)="a1e846f66c1fe90946bfcb06528d63a1ea786728aa156d2b7b5836ac4bb70b166de28734345392eabde6db94419b7d7cf909528dbc8513662a348b7651be1bcc10479b10eee1a4aace3acd79c5cec2b2fa72dfa1140945fa93348b85cafe1149991e0a1ae44bc1a5b829a26369ef8ce4c2271dc2fec1af919bc909053da3a1698f721a44bde7d660dc845a0ca1cebf2227e4c6a96984eddd05a4f3cccf2e0ea2ab18cd0879d6c8bcb120e9c6f030fd2c444425dbf6a3765460bdcd2ec13a3ada9542f42c3381fbc6f5beded528fc642343ebc54315ec688f31d67a"}) [ 1349.199310][ T4646] kAFS: No cell specified 16:41:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0)=0xffffffff, 0x4) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r5, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) sendmmsg$nfc_llcp(r7, &(0x7f00000012c0)=[{&(0x7f00000001c0)={0x27, 0x0, 0x1, 0x4, 0x0, 0x2, "525f4ea4a7a16b4a35c4edba36670bd877b9c1eca61d25ecbfa6bdc7c6cc6b084a2f1b1ddaf20621811937caed2d36bfbc07add819060cdc5983e661e547fd", 0x32}, 0x60, &(0x7f0000000240)=[{&(0x7f0000000300)="8ac8af2c2b292b93234ff0ad46573ba881196994a5086410f6dcb60846ffcdeecd3bcba64d97db390001cf80979dd304ed568caafade2f8d93243f3f249a3c1a9aad39c2116feb17d0e043b0215cf4b5d53314c40c45a1bf2b9b32c7215b004ee91e2fd581dc476031f9546ac1c13ec1c2389afee4479fa2e8f76ee54367d18ab2fe", 0x82}, {&(0x7f00000003c0)="7218761840fde2c7a492fb925e78e53af898dbbd28d813cb9bdc780363daf7142a34652058b6560aec65999cd21cf770910f62a4439fa931481be0ed585307a8de8d23b75cd1ce2dc53bfa657f19f100c902f5ae1bac184801e99f8702c416238b0def9750cb36cad6e24bcb1e37d3d52576b6c2fd00ea4164e846ce57a6aed4a4ab8444944f6cbd85", 0x89}, {&(0x7f00000004c0)="b5adde69fbe948c6770eb164cfb911be15872e16acd648d5a16d26365699b5e44394927846a8a33b87074c0caf18375aae31d585bbb9feeb77178223af3de8ba0b321732cf205b0f7ca60f5a9e756456b3dd30950c48f5d8b18513f7d8414794fb111843ea789db0884737366418764b47b22a05c3577ba52d6edff231c64f193c6841965c89dc4ab0c208b7b92c771d51e79634215e5f89f83d315d88456513a14fe30b01db95e09bab515cff88", 0xae}, {&(0x7f0000000580)="7bce07fec92e71589a86c448172c859fa7356bbcb06279a942c58c362643835a581abb168dbfc2c08b1147df386fbfe5cc8ec11250c97a95f4adfff6ecb4461f7746bb3a1b0d3e978970aa38bb94b704538e0134f34f2ce6ff9aa28272e6e215c1865522bcd6eee49cfa700b8d81d78b81907946c8f423c8a78fa8508e64a31279544e7ff381bc4294e4a590967a1ca1abfdfe9c61a71c8590e1c07f31c8b069375d415e6243aa0029ec669646f67dbf488238fa1c3ed28fb9cc13c5c60f8260a25fb01f", 0xc4}], 0x4, &(0x7f0000000680)={0xc0, 0x109, 0xffffffff, "093451eb9fe56d92792e4c60fc52ff7ab0827359bc8e61e464ab6e02aa3215f4dbd6e189fabcbf5e8c5dd62e834277d1c052610d8e34056d129bc04bf8b0c35f16a6a0b126e03edeee96d3ca2a57d931a78432c9a2778b0a691f32b9a1fc40921353f24ae89bd457ac23573bd29adde0b9f678702231ebff99658f88876216e7d8cb9cc050de40bab8c618a8ed0b0cfb6c8e57aaacfdb52c5fdd7cd865fb07c14f58186bf19bfce5fc59aa1483"}, 0xc0, 0x4004}, {&(0x7f0000000740)={0x27, 0x1, 0x1, 0x7, 0x3, 0x2b, "6bf14d67ec2be07e5e47a0582aa629bab8b18ebc20a7050c05ee5f2e0f42f2e03fb5f023ac7aab5217f21aa558c25f00a7cc148eec41c3b4fead7768c3333c", 0xc}, 0x60, &(0x7f0000000880)=[{&(0x7f0000000280)}, {&(0x7f00000007c0)="d6639dbc83d910c4b58762aa0023ccb93a7fd0b736cea56a2a955bbabb39f01195d66b3cd12a110c92abdac9226d2146df94bf3110b4e5ec0793986f8d30607d7a657f43c39696500a889275b471b27c4225cc31dff2896add217ee8e1948b580cce8248fe2224a54d02311de5a1f90e18eb640503d0f29e47954077b71cf1d153eec2", 0x83}], 0x2, &(0x7f00000008c0)={0x90, 0x1, 0x6, "ac43c435c96afa4f2962b86c50b0f5399cfd68523fe278fa21a18a95d2744d082dd70e04238e6a255051b494f94d8c3b0593d0dad20ef63fe49dc31500940d57b3229949a17e908d9667a5f70365ba88ce5e40b1101ebdcc6b419a99da7ea1948b71a525675d6560fbac13c96a4fc1f399290f7480c76fa38cab91ab"}, 0x90, 0x8081}, {&(0x7f0000000980)={0x27, 0x1, 0x0, 0x3, 0x1, 0x4, "31dee48458e4fd7459c12b4c2739605c14e23f060d49f1018a1d0cdb4ae3ef31994182207d6e4b96fbac390283598fb5200cad54f33e3a42a1198c113b95e3", 0x14}, 0x60, &(0x7f0000000c00)=[{&(0x7f0000000a00)="c9529bd69a1df620c6e7fbeae69448dff92c60953fc1fc74512a16ca27007600d459671b719c04d72fe25830dd73e1e1393662f8dac6458fe2f96c265623538dc3e59e27ac10997621bde00c3fa64a416865704cb2380a", 0x57}, {&(0x7f0000000a80)="f5db81f12f093caf7b445e24193133b2eedb564854b9fa34e9dd0a93f9a31be506d04f593bcf6ad4007b8a3820b5e19d563470a6", 0x34}, {&(0x7f0000000ac0)="00153b55ff25b644e5d537d4cf40358f0c25f9cfdc94725d38aae70f43defee46f90f6a8303ebee79a649c3fb2365db2442c88fde6dd92fbc0a731b0bb7894dd", 0x40}, {&(0x7f0000000b00)="628011a9395619ce846181aa98cebd00f54ec9e4ca7d92174f362c09b9ba2734204ba2080fae772a5336eff84e0cc0f5cc00c730da85b5e6cc33b4ae88d90681c3a1b18e9054185c6860f9c723bcc2f7e54a4a8fe9069cc8466a254232b34bf0864ebe82bf1177e389e94164293858869d27c977adc79b", 0x77}, {&(0x7f0000000b80)="0eb793c6b590c5f4a5d9edd9dad1dd93950d83cbeb914de6f620c0d9110db6ad6edc4c01e445ae58744394eb1f3f8c4b81f0b6628628c0838e1a45a57bd9449c6168a678d82309f45e710695325082fce1c04611dae8494b3f0a5407fad6cce127f3572856c677606a2ad9022fae", 0x6e}], 0x5, &(0x7f0000001600)={0x1010, 0x113, 0x200, "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"}, 0x1010, 0x11}, {&(0x7f0000000c80)={0x27, 0x1, 0x1, 0x5, 0x0, 0x1, "3af8351591d011df23c51458a66318d2b313910447464da6b5860de02a426f08a20ef4420467666553e12c3696a18cf7f8bb373e36b605000fff360ea38120", 0x3a}, 0x60, &(0x7f0000001140)=[{&(0x7f0000000d00)="4356b7c3de558252fab0d213e4be2e60cd81a4782195611de9f4dd0a5e9358efcc3077eedf92c3158c60234730ada1022b80f6f7af0cddbce476fd947e4cdc330cbe38f8588bb6688bab0093477de45127bb593bd5592a80baff8a885f88126fec40a862d1190e25cc6ccd8f200af278e4c3c9039836df388221862366d5288cdf8fc2d54dc55ad401c0d12c52c37092f11f705939b2b4bd9dde492e1a190637932f22714eaa6c7f0309ddf36255e5953fc9d2ffae8e0e210654bdd9f4ce32842072bab3b735dceb3db18db14655c7137ef5ebf4e4fc", 0xd6}, {&(0x7f0000000e00)="36430277df74bdcf830b52bda277cca16cd58a782f4c6b67a35935707c0923d55b268394000d703485fc55b2ffd08bf3a93e0130b39359a3d73ef4c810cc96fd05400a8ba06df353212d7ab8ce", 0x4d}, {&(0x7f0000000e80)="97ee2f85e336c49154499c062c119b721de323f39f9e4ba68c98891f71fa1980daa4b06f52b16c72a12fed0bf7014f872fbb637c1b8f48893245b28acf7c417eacb7f47e3a8e70593466a402c5adaf5820cf347a9c4e12c1e77ae443893bd89daa01aaa687f7eafc1a4b5a3fd1187cb2218e1e3f1f1b3dae06580030621fefd85582eb6745b81fc0e6463ca5ef7115", 0x8f}, {&(0x7f0000000f40)="456ab2f963eaf659f3eba112203618b5831edb81d3448c827434a3ac56a4df3958a1f56af052ca9659f22710f2115c6a287d58204df0fd434a060f669c037213a5c69653b87b4c21ea8f", 0x4a}, {&(0x7f0000000fc0)="7ef87eb2a83129d2a5a8ddeaedecf706a0857a4fe05478a8b14a3b57c67b235e9a444b8eb040267ad47d649d825bdce77f93fe5595d8c563fb27f5d594ffe849d9a9d4e923029fd5594a0eb9", 0x4c}, {&(0x7f0000001040)="ab46702007f83729f5c329650e438d4afb005a43a021ab7c5cca2daa6647ebed65355bb61688d62a5aa1d0224636c6da3a0f7b68ffe11c9e7992b7de29f120451f4e9a3f80f782ba04a83413a4e6f639a328b3b4d69c247043f807412d5a5ae2daef63dee27479b4", 0x68}, {&(0x7f00000010c0)="481755b4143d81c1ca6a505c2ade26b3f9f22acbd99541bd3c1c59476760630662cf398e78ae16750b8c1c11885c10c324cf0ba7e5add05a8a8441848fb47c136f91f4728f6aa5e06575faab2b93814d4bcf799dadb6a03cd27380dab64a44605c9520c9d835b72e", 0x68}], 0x7, &(0x7f00000011c0)={0xe0, 0x10c, 0x2, "dd7094de47c26d24fef6fddfd02140fa277e53551d7785e1442c06555d66529d22bda4002c68ea3072d35a569fc0b8e78c5c55847251ba8c90cccc011e2e1e0f2447014064ce408e9ecf7df7a763353a297cfd248b3cf9be9bbcafea6d297348614d57f39f5b9f806744062b41fe9aec3ac5faf34baed3a8ef2ca6d8221e9ce745c1d3e31631f12b6cfa763dbaccfdd69b6086a6575c1d02ea0edac70c4bdd03646c5e51f545079e6eebc5a0983d7b65a3773f4367e2a45032637aae60a1a1510a2bcfa5934bab384e36"}, 0xe0, 0x4008000}], 0x4, 0x800) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r4, 0x0, r8) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) signalfd(r10, &(0x7f0000000180)={[0x1a4e0b6b]}, 0x8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f00000013c0)=ANY=[@ANYBLOB="2c00000003000000000000000000000000000000000000000b0000000000000047504c656d303a6264657600658783a5f025d027f40e168adb4137718bbee4cf56bff14e01adfad7c6d49039cc1f7d14f087d8b61098bac134f6304763bcefccff06c51a8e71eef44029d631a696"], 0x2c) setsockopt$inet6_int(r9, 0x29, 0x2, &(0x7f0000000040)=0x5, 0x4) [ 1349.398342][ T4768] kAFS: No cell specified 16:41:19 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="0800000401000000c5a31f86b5789f746161455daa74214f850137aeb1d2d1424f60524fd1ab0eace6e7c7546616843617d7030bc0db97d8e4be622d2671c879a2616fa02c659bf05cd74e402fa7ced61c3451457f5ece47f252f37732b78904562271dd8647282a9e9b79"], 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r5, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) r7 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r8, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r5, 0x0, r6, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r7, r8, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1349.447477][ T4793] kAFS: Bad value for 'source' 16:41:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0x1f, 0x9, 0x4, 0x1, 0x0, {r3, r4/1000+30000}, {0x2, 0xc, 0x7, 0x3f, 0x8, 0x7, "06cf89d8"}, 0xfff, 0x4, @offset=0x80, 0x371, 0x0, r0}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1349.526106][ T23] audit: type=1400 audit(1579970479.394:2141): avc: denied { open } for pid=4824 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1349.528568][ T4857] usb usb9: usbfs: process 4857 (syz-executor.5) did not claim interface 0 before use [ 1349.618697][ T4888] kAFS: No cell specified 16:41:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x6f4e4c65e23bd9ce, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x800) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) r4 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1349.755792][ T5022] kAFS: Bad value for 'source' 16:41:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x101000, 0x0) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f00000000c0)) 16:41:19 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x2) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x9, 0x1, "16"}, 0x0) r2 = open(0x0, 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x3a0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000340)=@broute={'broute\x00', 0x20, 0x3, 0x4e2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000bc0], 0x0, &(0x7f00000000c0), &(0x7f0000000bc0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x5, 0x2, 0x6005, 'veth1_to_team\x00', 'veth1_macvtap\x00', 'macsec0\x00', '\x00', @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x30}, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], 0x9e, 0x11e, 0x156, [@state={{'state\x00', 0x0, 0x8}, {{0xfffeffff}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00', {0x7}}}}], @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffd}}}}, {0x5, 0xc, 0x15, 'vlan1\x00', 'ip6_vti0\x00', 'syzkaller0\x00', 'bond_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x9e, 0xce, 0x1fe, [@pkttype={{'pkttype\x00', 0x0, 0x8}, {{0x1}}}], [@common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{0x11, 0x3, 0x6b, 'hsr0\x00', 'veth0_to_bridge\x00', 'geneve0\x00', 'vlan0\x00', @local, [0x0, 0x0, 0xff, 0x0, 0xff], @random="171522fc2130", [0xff, 0x0, 0xff, 0xff], 0xce, 0xce, 0xfe, [@arp={{'arp\x00', 0x0, 0x38}, {{0x14, 0x883e, 0x1, @rand_addr=0x6, 0xff, @rand_addr=0x53e, 0x0, @dev={[], 0xc}, [0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x8, 0x81}}}], [], @common=@STANDARD={'\x00', 0x8, {0xfffffffffffffffd}}}]}]}, 0x55a) getsockname$netlink(r1, &(0x7f0000000280), &(0x7f0000000440)=0xc) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) setresuid(r6, r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xb) setresuid(r7, r7, 0x0) r8 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) r9 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r9, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) waitid(0x1, 0x0, &(0x7f00000003c0), 0x2, &(0x7f0000000180)) shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000180)={{0x3, r6, 0x0, r7, 0x0, 0x0, 0x7}, 0x3ff, 0x2, 0xfffffffffffffffd, 0x0, r8, r9, 0x5}) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000008c0)=ANY=[@ANYBLOB="400200002400080027bd7000fcdbdf25110000008400288080001500d721f121e7a76c271835b3783530556098354595e4f75c4e09943ce7a47826d42bb3c9c436e307477ec7dcf72da1ebf5ec4f2c7abbf2328a2e8924cb4de591ac3a29544fd4205d4d53772e0a18bb68dac0edb0bb5c9979b5105b4e1b17c246faa41c0ed3613e6c97bf304a42c9f81f1f38af8f5759e073806e32b00308005300e00000029701788008005b00", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="7a9e5aa5b2575fdd5b1eea97a0b71365bad05d5352ba422ee6ebbdcaa80f2e39741f1d745456ecfeb628ba4f790d2af91e122f4d2230ad0c"], 0x240}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/24, 0x18, 0x0, 0x0) [ 1349.863587][ T23] audit: type=1400 audit(1579970479.734:2142): avc: denied { create } for pid=5066 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 16:41:19 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000180)=""/173) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:19 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.006324][ T23] audit: type=1400 audit(1579970479.874:2143): avc: denied { open } for pid=5072 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 [ 1350.100304][ T5181] kAFS: Bad value for 'source' [ 1350.104451][ T5201] usb usb9: usbfs: process 5201 (syz-executor.5) did not claim interface 0 before use 16:41:20 executing program 4: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x40, 0xf, 0x7ff, 0x0, 0x0, 0x0, 0x0}) 16:41:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.174646][ T5201] printk: syz-executor.5 (5201): Attempt to access syslog with CAP_SYS_ADMIN but no CAP_SYSLOG (deprecated). [ 1350.174658][ T23] audit: type=1400 audit(1579970480.044:2144): avc: denied { syslog } for pid=5139 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:20 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.350105][ T5286] kAFS: Bad value for 'source' 16:41:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:20 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1350.514937][ T5201] usb usb9: usbfs: process 5201 (syz-executor.5) did not claim interface 0 before use [ 1350.525839][ T5293] kAFS: Bad value for 'source' 16:41:20 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x10, 0x2, [@TCA_BASIC_EMATCHES={0xc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001c40)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r11, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r11, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x10, 0x2, [@TCA_BASIC_EMATCHES={0xc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r12, 0x112, 0xd, 0x0, &(0x7f00000001c0)) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f00000038c0)={'team0\x00', 0x0}) r14 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r14, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) getsockopt$inet_IP_IPSEC_POLICY(r14, 0x0, 0x10, &(0x7f0000004280)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@initdev}}, &(0x7f0000004380)=0xe8) r16 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r16, 0x112, 0xd, 0x0, &(0x7f00000001c0)) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f0000000780)={0x0, 0x6, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r21, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r21, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r21, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x10, 0x2, [@TCA_BASIC_EMATCHES={0xc, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x40}}, 0x0) sendmmsg$inet(r16, &(0x7f0000004400)=[{{&(0x7f0000000480)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000001640)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="a4ea28d3df8c986ce3bd1b8b44c292ae7c1c634e9eafc51f33c7262e01c72cc07380ac30c32bf44530268fe75875655c35edca9e5f8368d82a248c1506b3ddd7746bc66af5df8e9cb41ae702eb8fd45ce1af45162c290f94f33bd9745ff12dbddb80886e39c8c8bb0c263767857e59ecf8b929ba976d17b2d0f92f867c2fbbc2ab07237d5ca7cd4eb5d52c", 0x8b}, {&(0x7f0000001580)="950cddc8c910db136d284b5e2361c573407a849ff3d68a8b6887a470aa0d3a7213fc7e47a0302ae5cbb020cf8b3a7111d39e82703ff5171398bac6e0bfe4436692affbce8132d3297d4269bf8e6308a74338e0393f142e7694432f00e2e4ff9ff632456de119007320738a0a282e73fb343248f3ee37456335ab904df315b260e27c34aeb931fcd0a50f8b62bcdb92224e262594a4a75f217996084dc9694cfc90c176abfea2cacb704af92d5d44ceba9c", 0xb1}], 0x3, &(0x7f0000001680)}}, {{0x0, 0x0, &(0x7f0000001940)=[{&(0x7f0000001700)="4805c38ca69ae9531d98fa192c675d6145769deae830639664c963912ff7528d639dcbad8768d014b8465e0c0c4a1d3623629c64d186f56f3ae1a23a830107b2414358b897d8b336cd960edba3b376ff39d2f7b484d4525d3cd25fa4cd5ad5c1bc9f05a3eefd030115e447017bec90cc", 0x70}, {&(0x7f0000001780)="79849f66333dfffc8e9924f7700cfe2df8fc8a01ab49c106667e4993bddb8fc021b24e450b0cf7df430fad16abe2fb9762a31f8f300de68780023abe3896aae66217889b1a0742385f01184036d095fcd89a94a6ca4e362c2abcf76e1b15077a8a21208843f5990bac1d46ef941455cdf2eb4eed7a4ec47b73712c77be89aad6044a6a558b893487a06b4a9d0d648c7b9b842b622be5b4090daee653431fc42127db4449ae73505f21482d2e8a21b9f74a1bab5b57db95f0f279876cb7e9998b954ce6ec39ece26bea2113fefb0e98cd63cfc765830ceefb8a3d6e90db0f23f39ecec401c2cbc0d1", 0xe8}, {&(0x7f0000001880)="a5a4bd", 0x3}, {&(0x7f00000018c0)="23bd9d1a1949f9960c53d92faeb5592f5e866a1bb3e6dd7788f81c4c8e8b1f0bf6e0473381f2d528058ed58d7ceac7f608d79d6fd3952029c844bdd4385f2fb4f73cd9ad92b1678a50491f2aa761423792ce045ae02db513ba744c92d6191a25582f9c33d4cd23f844447ed3e5cc637e0b6ebe230cb7f5ba8dc59fb154f540b9", 0x80}], 0x4, &(0x7f0000001980)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @loopback, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x38}}, {{&(0x7f00000019c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000001bc0)=[{&(0x7f0000001a00)="091d602dbec2429c28084327634666f7cc930ef89c6dad813c9390360e4355b63f6afe1b90697e341adfbf63a219d87e7f94b43a4f123d3cc2bac7d4be5cacac0e0f720d530f4dfe0f92e23bfbacdfab04e9f5ced214", 0x56}, {&(0x7f0000001a80)="ee7d54aeff970d5444ec5accdf33d8124b32f9ea36cf3ee9780f0814229fef65e52aa7dbe88913669e69d03360c35806106c0839df0d", 0x36}, {&(0x7f0000001ac0)="251255f5f8ccab9f99ad1165f3331dbdaaeda6f58d54e71460868aea4a6de65d5e686233d774883d2dcffbe30bed77f4da13322e20da86b3d3ffb0fb1926342dc15b6b6badd0e37459a0b06e3bc13c91cf9498b0faf9c31f496e1ed5fc5a270c339bf3bcf3d16e153187ecd20861e75f3946f9935fb7c63abeeea9f8080347477319a24f0165d45e59c9eee8b122d8fea1c24e3bee368db9064c4723a5fe337bc0e8a27b6944d3c43a9a4795ce10a27bfcbf05eb5ac145b3ae833a7b372ef6fcc58781256361779ecc65f06ea78264748f876e2a7f4e7b67484ea028dc375c6ba12db76afc6cca0a7c5582ef39badb9bfce37de403a3398fc5", 0xf9}], 0x3, &(0x7f0000001c80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7e71}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @dev={0xac, 0x14, 0x14, 0xd}}}}, @ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}], 0x88}}, {{0x0, 0x0, &(0x7f0000001d40), 0x0, &(0x7f0000003340)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2a}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x48}}, {{&(0x7f0000001e00)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10, &(0x7f00000030c0)=[{&(0x7f0000001e40)="153eeab242a417ee9d7d402d0b40cd277647318e8c1bb1da26f914327b1151d49a6d294da4fe30aa05efa9a618bc214f55c87c9857e8e4942586293b68fcdcd570e5a1cb40db1f7d28161b1210bf8ed7b99d077cf8a4e8347dc8b1512c02aafe4e80b6dc708a56b0945176904bfa8d02982802cf09a5f956b72620d66756a5a3cf6f9b4e50da42148fef4675ac3a187818f44ee53057c1d36a3c74d567377c7a62edb2c15afc44d90f1714666ff2926fb59d1460e30a0cda56203098ea83ae527f3870d08d841c6830f379df3d293b14ba2c174306ce62e5b02f63cb0cdc2cfc290d4f177bcd4e6a080e49b9c92a417b7cd5f8fa389554a7a9568eef328a73e5efbd0f24780beb1f460c40a6a9c33198609716731a6ca6e4d8f16e1ceafa5183723a7a0537633825eb88776b10976b319c03c0260fedaa61d4e844332eb0fef156104a992df74b44c67d086bc578ee5f4a8320a53833074fa16864307587e12aad2841b2065c518909b942aff1f570a7199519f8fbfb991c87f71c789f57feda590cba8e3f830e6fb2e8831138e56dadf715baef325aeb3b37f9ea93a67a927d4d319850d7ce4589a37e491a8e7806419ed7f5c707bf4cf6150e05f23a27d1c8c4ba024f60638021683aa98d10ee94c3a2a1f659d7c279c6084ee95460c227d521a61f71f9df99f6774131a63854809403633eb7db91c2b610865d9d0d709b47389b4d4e63819e3d752eb108f31f9f51ea54a8cf7f080a4c3397832937e2c3a6b6fb3edfe4e8f7061088ecd83ef8628c149b0c234d551ff59345813076e09dafe8a3e953c63436bbda65b9d7bd3bdcb259a5db0baf66b0bc645459699544f2039e343662495021a4cce296707042af5871deb7ceceb83778831debbdc043ca0a1543e2bef62ba59f0b309e3534c1a754a3d6a51276231733f6dc23ec0d15bbde9299e1fbcb51d71351530cfa5334524b1b54ad91f5bf02c35255d0751d397754c255b365515d6fe0478b9f50ecc7296af0c68a0bf559ba3747891010e3b59163333ef047341ad708b54fc4958e783b40ca708c4fc8bbb20433eb1799ddb5cfe382b62498b41f6ad1ce25edcd90a0e051e44cfc3158705bf45da5c79c8ba1721e895b2536549b713a40ad76c05373f77ed2cd3e44ad46cea8367454f8b56af58b9a63b388f09cc02804ddff4a5ab75b1a84e19d21e81bdbe0126954ec623121cb6f69c954169b86f7c8a5fb022cc7dc529bb4a750cef034fa963aff806ac1c62193ece4ef3107dd2201fa88fc542b74670dd569f1aba08c7a874f63cce533b2fe65ed70d30ac267deb1ff47e965fb740561b23e1a2ed2a0797bb6838182345eff745d06b3ed46490b7d9405c26b8de090e9db4eaf61eb79f7d864043fa8eaa28376ab54c98e04c96c1fcb9a49f651638979ee2e22a120550f02a0e26a1020f6897163c1631d0e4556837c06a611e3f66dba777e2b5800157fe0d31727f56168a40ce79c5c95d991c42e0733d78b206514c080b5fcf8cd617a892901d7837b491924f23e3823473c45ea671a8d4d36fff8eed81a8e1ab252d0ae617a0cbbf6ff93b6d22f01a38758510ec472480c01820b201738495d21e7b98e4bce33e5f06d924dd9938b39c6f6458283133d78cc4edabda00f314451fc7168822affddf1db5c0af7293026e25c67df41272108c1e50ca341f91f3aba7ecc320b68dd2d57ff12399715886a50776c5c1226f4c3318dd0de2b2bd56b24becc286952c6053597f5d4cb9a44da078b852776993900503f45591cbecbeca637c04843b8a85eb12ff6225be9f9737933a7620e9b369e626c12dd1ef4b62320d197ab53f223df8938b8c36dddcf89c7e05d0b7f2404ef1ecb596a96f392b64f10d94d3f17168d1c849853b0c7e917cfd617c94dbf8f4fbfbb1389b04107f3d64b70310101f8421c1981af1371ceae848420f69c2f0bad9b47e3e0b2038871fe7bb6f6d561fee97e200c67454e8ce4cf5c2866050c21a6dd6e405f8c1e41d1076e2db9d77bc8a86d58e93d7028ffcd0479004e67cc85b7380c5f3da818124b01c26ed1342e8a53298c55756d9510bac0b147712d0e95a409aa9ac6e1e8e4789f4a0da65b9290b6895320bcc21a5ddc4947c0c7b165a6f17a9ca5cb3ebd45e5678113d58b437f6cb34fa433c9efc88e5484e9bf8f2c1ea4d2b790a9617518cc14f3af5de68f1e6afd62e06fe4d2e2fc6c2b4f2cb0165db1c01a2194111c3fbb03beb8c210becdef91a24204bf5f829680bb30a5e7880e67f1a5fd8781d2690a6cded8b8acb7cfb046482d764a135f16382ccfed38a812dc398ad3f92d3fc9cec40464f40dc3246c154054cb7d0f986103c2aabd29adec1e4f93e08c1c42475a4649e55268dc909ceff692329ec442890e4d5995d364c9fea76647c157ff42b21fd52861c974887bb6ccc2326da9bb99a452d133437c3a8bd535ad6caeb6f331a27a40934061f385129bf7745a6c21aa6fe4cd90b9980b5d046310c0cbf45fafd8baaf42f1b14298cdd7a79cf46fe32741cf6154fdac4b4052c0f2e52ce929820c21b7f4286c5975a3e4f028bee9df6944804fc283da534ff8ce410c9bb93e07bb3854b87f761c9349b6eeed2e56f7464688e62f5c49bf1d2ed7fc5ec38a4c28ce4004735e90e7bf96e7c858717b46e23e1441e753e256321c58254c6b013680e7d0d822e05c879c14f24e41d7fdc890af220fe41811b243386faaeabe10c6e772dc0fead5403b08a3e8e79054065916305d133211f72c4f5803804374a6b718d57f7f5a96cca7e61829165b3226aec73740cbc491d42124c39aad7435f51aba155a49a6944266b9abe29cf2bb3b9bc28dcae1469f6107d1f353fb84939c3e29199c9ea40c824179b6eda181e9cbc16428d809160f77687ba42d154fb507bae5e9b0a09582870075cda735607b3ca4ea345393e402bd1162203eabd110a3617fb35227aa541490dca3188a0426f995884e7bff061d2568962fee812dab743b5fc7595d7172dbb6736cd20bc64e8b18a1acb800939f7c34b97727902ace89485ad5ee712776714d5494fdc70a1f4dfda3ac36fd88393e0d48b63587605e16b8cb4f67e51fa3e50043e57b746a4a40a747a3a282f773e3a82caea16f6863bd10c6f50916bfeae0a872988579cb56d4bcf045a46cb702a9a8e071eb23439afcf572cb9c34d987b541376417652b84ce561d7cbf1873548061b64d8c6fb9350295e10b721c49232ffef7c886869a48d5254c7672317208d681e8e0fdaff9812c7ee13a513ad28a97f31e48665f82f871a05f38bae3e412bd13d5aa7a14e4166e6e466575e7d346f64224fe18b2063e324dd06481e3e0435f719540b4d956f886a86d43fdbef1b760bd356dd68b769c8e9b7d2e28ae5b1ebe1c08335fb838af770e25c363ac2800f9f2d89e674f4f13aef38cdb25b0f502cac14522d60963c35e54b9dc00ee7cff55d157fea523b6b6565dff543697416962032f1be2da37f597697587a716e0875aa33f1477fae0e3aaa04fda37f169a24112c5cabdd2e5cc8d54a4c01dc74c138a45bcd3bf2dfa40628ca495db804deb3af97aa60f02243b4ab5c8fa8caaedb48f89049e341dc3bf8e19c63f1ea52e414f7f56fa48c9fa4000eefacbf5cdc73eafbc9911f659e21f2ff3b5220616cba7acbbb6b9f5db9477122bb5b9816178267877bfb8476dcf1fb230fb1147bb86354dc83578fa9c45a27c5b676c0225ef6384d82782e235c222baead1464c14cd691fdc62638326407d5773852dcebe31e21e33e9af69bf3375536243795648afe5125c1216493960f2742da7df02d0050992a7645eadda305c58e6a335dc070ca168eb01457fd2ce2af2b52459b2a70a1d1fd6700126a829c20e39152e883bb65cbc141a66a5a1c86a2b05763d4c5e67dbef96a7c292c8f132ca3100dbbda6008a21d2fbf25a1f8c11f92edc0c7afa2332eb7ddef61a794c65e291596b7c841dd05cbc38a50e9c8081d0550fd055de900ee9c217dc741420cffcf1349f38adcf70e6902e853539f3de15a1be5256df9d81e8e31fce1f216062ce30a875d1f5b6f9882ec44b2700a2d1b5933c6e2e90deb6334590bcfe94e51bc8c9d1d99e742ec6e46db82532dbb6eea09c2422801f9f645c3e24c9c2051eb21db6ab4011b3d0eff5f4de64c44dd6a1e39ac7b8602a8ea628365a2ac950789240459228c2e313647a28e7183803d3b604c629a1f3cdbe6d5f9e59d8d1f66e5dc66fe44d080dc6c8392709cfba5e57a1d033fc79dbb03baf4e94b282b6f4b4765db8e09bed4161329d35b97eccf58b4f87830d01ca3aa5555c78d0a11611d6e26ef88212a3bb6386361a99c1d0516ee3ce581900815d0c78739bd0af9fef802a211f2f46c1bf80d121ae8dd5ae59e0ae24a1b1516685c05ab5a364edb3307a566bb9379ad2a3cad77a638a2fd0435cab18962b341fbea946828ccdf868ebc030ea7bd35b135cd22e36893fd985f9d5e60ac395c7a765b2de837e7eaf7e14fbe5e256be2a384cc64b2013f71aa4577c31ddd2702da28ad94966b4ac26d1936c88d2deab0e73e75fdc6e5daf55c60ff3f5eea7b2944db247983da2abca4efa268ea0d50d76b6c137de49c101dcfe1273c5d14c9db20b39efe4fc23d7738fedd3ab0313ad53c28a964e0b60aafcbc16e729a40497e36bf24af4d902946659fc52e4362ab9e908d6db0e415dbe5073e43bc898935235baadd9835ca61cc069f9147c1ce487a23b37b9c88c8e0275506759ac30975c7ba5299a7068c9711f9da08caadf257c6ff76610e22cb195bf0d3f41738447c6b194f6d6b6555959a4a91da93f3c7102a7b93c8f0502ba32db95e86c9185f94c2839a46bbbf04e65b4eda5c8d2d73e62ce7477d5996fb103b4e871f21087a0a9150ad6ceaf2f40e1163b04ba4b6285484122598361772affd4267365221c0e4dd99f519e9221fe19adeaac2abbbec08150097c782b05f6c7dda505e9c62bc5f88d955526931c6e8ac3e21cc4917c7d8caf65dc29e5d9db879bc0658fb745cbcc0d7d5130be85668b734c34a9286f362d59c77f57c51cc01bcc6a2cb356ab5fccadb7c7443bac9a369047e24202387ce05a42807613aa6675d61fc19ae4b0195e625377e7085c3e10b86a05deb76410334abd065b38a621473d1529f0132eec2646a99dbc6c5bfd53abd0e322b06c075a6a6df87c0cd1ef1a29f61701779856728305c5b403a1d369d1ca15138db0b5400de7b9758c6a7d23140dce53ec738990c95335d18b3cd39fb6e463c85dcabe3b7bb9d4ae4812b96fb25a98afd2e18dba6700cc9f05ee452368c0e7a3509eef6a6036717fd41c61d89fa6bf92357f548728b5bc5afcaa84a546f1a1ebcb1de9ef30da5ca146a614892f1b5e4ea264ecaa2f393f258f998601582f2dee6295f1d93ff5dd2e9e1c34bb51833f2997cf21cb7b0b0e179568c78b69c790bb542cb8d6826feea58efcad7734a2baa8134ed52fec943164733682d904c4f36c9ef85d6d20ece9c6f268063acccf522f82bcfcf49f3d08fa343a3a87a039670d263ee8d62f1d85abfdca1a4ec7900cacba44bf3c1418467bd9b2eeaf83230a941e5b1ff9aebbbe8d4191a349ba3924c243250d31e537822add56db9dc1b49a793211eff987306317fe3dd292acf526d64da59170cf728f8b04a16b5e18cf03d8ec44e43573a490d1a2c02020b9512c782949ea17a305a12d70228115c6446f926973e222fb9f8b56c9adad388eb8e4b2726cc6fff907a80cd186882bc534d5", 0x1000}, {&(0x7f0000002e40)="ac2ecd88bda19dba995a28cb944f0a71e2cb7991936f4f9d36e1a5fdaefbe8575172d4f7843a1c", 0x27}, {&(0x7f0000002e80)="306fb057e61924466bd89582c1fc87715951674b2490da8595c9bd163e4ebd1d9a6a54aab269c46bea721da84b58f37a8701787a9fb9e956bb1e94ce16f55607f1cdecbeb9860b958df661c0579700aa95a9d20ee43625197f948e59263f28c5ce45beef4537ba814c26a2c6e97fa15cb4c018db26545858eeec92bad0ff9d19b3eaa4ada71f3836a325ecd073fb907e639018d64354fffbddc8ef9c5df3bc955430d07b", 0xa4}, {&(0x7f0000002f40)="683a39599373752af2ebcf65ba29df8af8ff5d7a2e98ee46962394985c06f303ab76307117929d4d641cf180427d31a742b8ceb5f11f8af63a865ee4a88b3de2132f9927c390e2de011b0f6fe4eefadb4301eb11688cb175d5886590e37b3dde7a28915280e4a0317696d25a7b74cf095520c879dc28d686b68cb89f09af113b0abfd4ef4cb0c450164dc858b63fa3430460c8a0bcc47f1345fdc62b0f4ac1846462c9352a36de80c0ce828840ea715c8d057c9befbd", 0xb6}, {&(0x7f0000003000)="4d5052e55cba6611aeb0f90290a9192c89c1b15ce8a2a4db6e35ec942ff0ba6e2b07f09a972348f895f6e6c7f50b863e521bf8cbec", 0x35}, {&(0x7f0000003040)="5328d0e99b8d4a570e6f3dd21a029114132444c84e4ba240b95fc5eed78f3c6423f9c69a2416bfe42c0f91a8df37106f2f81875884748b074abd0dcb6df6ec8bdcd9486f54652ff95a43c8cde80ea177b5485ab9928be90f0a8a36d1ec707256b7bf6bc983b00397", 0x68}], 0x6, &(0x7f0000003900)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @dev={0xac, 0x14, 0x14, 0x27}, @dev={0xac, 0x14, 0x14, 0x16}}}}], 0x20}}, {{&(0x7f0000003940)={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000003c40), 0x0, &(0x7f0000003140)=[@ip_retopts={{0xa0, 0x0, 0x7, {[@end, @timestamp_addr={0x44, 0x44, 0x83, 0x1, 0x1, [{@remote, 0x33}, {@remote, 0x5}, {@loopback, 0xb000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@broadcast, 0x679}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x9}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x41, 0x0}, 0x8}]}, @timestamp_prespec={0x44, 0x44, 0x90, 0x3, 0x3, [{@remote, 0x7f}, {@multicast2, 0xbcdf}, {@multicast2}, {@dev={0xac, 0x14, 0x14, 0x18}, 0x9}, {@broadcast, 0x5}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x401}, {@multicast2, 0x6}, {@rand_addr, 0x80}]}, @ra={0x94, 0x4}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x40}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x54, 0x1, 0x0, [{@multicast2, 0x5}, {@multicast1, 0x3}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x8}, {@broadcast, 0x8710}]}, @ssrr={0x89, 0xf, 0x36, [@dev={0xac, 0x14, 0x14, 0x1c}, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x25, 0x1, [{0x5, 0x4, 'H\''}, {0x0, 0x9, "aeef8033685ea4"}, {0x7, 0x3, "99"}, {0x1, 0x6, "55d2d949"}, {0x2, 0x6, "38d93aaf"}, {0x7, 0x3, "f5"}]}, @ssrr={0x89, 0xf, 0x50, [@loopback, @loopback, @rand_addr=0xfffffffd]}]}}}], 0x138}}, {{&(0x7f0000003dc0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000003f80)=[{&(0x7f0000003e00)="6b2bcdafc2777c489e246a7842fc1c71e6f9aa41b0e6c0e241e73c7a3061eb5e6dace1c0cca94ea0c4e3bb0c83de538891cd2b78389e8d5e765df6db3876583d5294cde53b04850130dab498de76fae642e6d665f012d8a7d0ed066b010aaa29bd114dbd", 0x64}, {&(0x7f0000003e80)="ca11eaff09e1fe1c1108ef04f21184e2a9a0bb57171a3247fbd2557e9f46d26d9b84802f8217dac5fb51a37475d76a7c65b205774f0810ff373e1d586d093b885a006c6cea41844db7efeed589bfa337987b8ca1b77159efe56403414a", 0x5d}, {&(0x7f0000003f00)="8e0af9c87ac4ff2a674e1f4da475e3e582e2cd4daa57896132640c8c3678060af46d3edf89fbf5f9d641b065d9e8a5be8c37886230f15f61175030d7bc4ebc0c67f53ed49ce9e053928495d43455df2f43f6f632e1df50bd1ca4a149dc05a2", 0x5f}], 0x3, &(0x7f0000003fc0)}}, {{&(0x7f0000004000)={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000004040)="d4a2a1d189a0a0a5cedfe127ca5be4b318a742109106e32e902c3b37494d834e97f77fb257d256e1c7", 0x29}, {&(0x7f0000001680)="63f41ed7", 0x4}, {&(0x7f00000016c0)="3e36fc1dc6fe4ba121b907c204d3d6f2b86dc50f315cade4f2f27dad03317ce38f566ac6fabcb876140777ab", 0x2c}, {&(0x7f0000003280)="323b0fad164650baac49de6a910be49b8e33067bdad4f85a5f6fc6d7ad0762fb76d9d484cf70df4a2d440634df46444eb333df2b33cce18362ae0e540d48cb1cc6cd80abd88e49ce5bc0307c4b83a866368c445269c24523a265a41956b25992b0bc230f784a5ccc5d00ab780e3380583f47912b89607928dda15c", 0x7b}], 0x4, &(0x7f0000003300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r21, @dev={0xac, 0x14, 0x14, 0x6c}, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r15, @empty, @remote}}}], 0x40}}], 0x8, 0x20000000) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0) r22 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r23 = socket$nl_generic(0x10, 0x3, 0x10) r24 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r23, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x14, r24, 0x1, 0x0, 0x0, {0x18}}, 0x14}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r22, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r24, @ANYBLOB="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"], 0x270}, 0x1, 0x0, 0x0, 0x4013}, 0x0) 16:41:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) inotify_init1(0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4ecda7bfb932d8a4, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101042, 0x0) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f0000000200)={0x5, 0x14, 0x2, 0x8001, 0x54, 0x0, &(0x7f0000000180)="a19e721733afb63bf202b36fb936be54b66bdd79294dabd46987a09737ca011ce921263bc274b761fa0e6439e908b60be13d0638a8488fc10f77780762800dc3c34c3c62a79b131ffc5c94801226cb17b55042f6"}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000300)=0x80000001, 0x4) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000100)={0x0, 0x5, 0x0, [], &(0x7f00000000c0)=0x40}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = accept4$llc(r4, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x10, 0x0) accept4$llc(r6, 0x0, &(0x7f00000002c0), 0x80800) 16:41:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1350.755578][ T5424] kAFS: No cell specified 16:41:20 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1350.818963][ T5473] usb usb9: usbfs: process 5473 (syz-executor.5) did not claim interface 0 before use 16:41:20 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000180)=""/173) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:20 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)=0x4000000000000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400400, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f00000001c0)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f00000000c0)={{0x0, 0x0, @descriptor="48414077916c58c2"}, 0x5f, [], "a1af53539707d8d79160f0f664d12733684b81a04f67d3b55ff5b082536f088e791aedfa7bd9a35a5047cb7abb47dc186889a037af07d3f2779d3e1f3d67092143cc23f403e413d5a46dcbb75d729a3c25f0973526e541a021144dab7ad7a7"}) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000c00)=0xc) setuid(r5) syz_mount_image$gfs2(&(0x7f0000000200)='gfs2\x00', &(0x7f0000000240)='./file0\x00', 0x1000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000280)="a0800b51770213356779c92dfc7138c8b79a70e6cb58964b1e38f11782420b8924d2acd86895c3a91adaf811d997bfd2fa", 0x31, 0x94}], 0x10c0088, &(0x7f0000000340)={[{@statfs_quantum={'statfs_quantum', 0x3d, 0x2}}, {@localcaching='localcaching'}, {@locktable={'locktable', 0x3d, 'md5sum'}}, {@localcaching='localcaching'}, {@barrier='barrier'}, {@acl='acl'}, {@data_ordered='data=ordered'}, {@lockproto_dlm='lockproto=dlm'}], [{@euid_gt={'euid>', r5}}, {@smackfsdef={'smackfsdef'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x31, 0x35, 0x34, 0x34, 0x32, 0x34], 0x2d, [0x64, 0x39, 0x39, 0x32], 0x2d, [0x66, 0x66, 0x33, 0x39], 0x2d, [0x64, 0x62, 0x65, 0x38], 0x2d, [0x37, 0x32, 0x34, 0x37, 0x33, 0x63, 0x35, 0x30]}}}, {@measure='measure'}]}) [ 1350.963651][ T5593] kAFS: No cell specified 16:41:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x1f}}, 0x18) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1350.986742][ T5614] usb usb9: usbfs: process 5614 (syz-executor.2) did not claim interface 0 before use 16:41:20 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000180)=""/173) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1351.194698][ T5784] kAFS: No cell specified 16:41:21 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x79, 0x44081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) recvfrom$x25(0xffffffffffffffff, &(0x7f00000000c0)=""/154, 0x9a, 0x0, 0x0, 0x0) [ 1351.230069][ T5769] usb usb9: usbfs: process 5769 (syz-executor.5) did not claim interface 0 before use 16:41:21 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x12, r3, 0x8000000) sendmmsg(r1, &(0x7f0000009640)=[{{&(0x7f00000000c0)=@ipx={0x4, 0xfffa, 0x0, "6dbbd653c168"}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000140)="4b6fe4abd70ae64411ef8766ab520a8978a2553b4bd9c3102f9c18a887d7baaca866130ef54bf0e702d51e6b4ce2b43e5b16b4e2e2dbcb1cdbb06df34b2b4fc1a9cb218312593c944d7e452c3e1e7ee23e0a6a1b72092cf36ac7a04900401a77bd4607270a323defb053dcde06b37d3193ecae7dc59b3e8e4df7b9bbcc2821a3308860f213ea227dab902d26f45b1f5bbfa5010ee4", 0x95}, {&(0x7f0000000200)="71e35d690871e65d038b5cb9d2d42fd19c5884277fe959758187539ba7f20fc79423687c23707d580190001fa5d8acde93f3721482880c6ba35bcaee87484a0feafac45fc24c2daee028b105db5558e563b797152c4168792e1a3907c9f7d67333292474fa1f45f6ccc86fbb0b65b3", 0x6f}, {&(0x7f0000000280)="0df1537cc1e5d0387932245f", 0xc}, {&(0x7f0000000300)="f9f74eeb27e3a280c0e78be19d031eec932a45a78cc0712b8f0046d8ba57eef4d241b8a73368e7039221b3cd4ab1f2a6e4265879d1b2fd7ccfcfca91e7cf8158b50cd8cddb9f6a75cffcdea5f0ab1ad51de6c298e4c986efc61d5ccab78ebb2031fb2a33695e8f346b87aad6c1d7274573b6b23a084cc2653cc35e24af40e71d2b592e0be9932fe6aab66d6accbe405e8b246bcc7551aeee5a0638f373dbe8ae3efbd0b71c0fcc1d7727bbdcbba66a85a2799bed234367db9d918b1a8d7749f0ad852147e830d091563e5939265748bc6dce315ef83d43d934f06145168741f06828debe542d871e42d79b715e36", 0xee}, {&(0x7f0000000400)="792716fb9bdd5652c0f7134bdf598ac3338a5105e849261659d97db8541bb109c49c10197f4d35e05dfb87bbfb", 0x2d}], 0x5}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000540)="4d5f469bb2594c33d9bcd55d56ad48f9a024be575389eb0f3285dd0c42942c4066fe6c617aa6d5782ce071e01cb82ad864180ccb0b47b86801dbb6edc66d9a539071ec03d413a8ba9f90913e9c480de8a8b9a6e84d6986a2deb2d8b26702de89caf68d86c0d6b761438e666257984d8acbd23a51c6297797bf2808fed524ace7ed0ef4f582116a31628c3b8b1d0284344da2b8cbf4ec561a4af4", 0x9a}, {&(0x7f0000000600)="45c30ec773f03b8fa5763d0a22d91ed37a7d6744ef75936522052c96c82c19d6d6a2455640ce36edc23575e82499748fa8c818caaf0f71dd7f8e8026caf9e8a99c9893549d6e577266d0c02a724cfdd7b5135d718ba5f105e021c7c73e16", 0x5e}, {&(0x7f0000000680)="e93dc85f75e7e63851dfa15e904ae87b7839137b797fa37c5022a70ce5f9d250cd8ef06dec2e125fef9f5c0192ebfe9510ee253736e6939f051bb01ada682e07e00e7ae5d8f356ece5bb87ed6ee1336ef95ac4bc00ec49accd00a99462d2f6447c76d0ab4bc79c1ab337948497fe0be0d3908746c55d5151be86e29b44733a2573ecf441a1362f", 0x87}, {&(0x7f0000000440)="b29545eec06d08756ddcd512524cc9f8ed82bd37b6516be2c4810d4076cbae2d428f", 0x22}, {&(0x7f0000000740)="984e10d12cafb39ab354b725274e334ddf6310972b9a2c00d0efc46df4545085a34cf4f3449bd56ee135115d9762954446c4d8e4e726362cba3a34ebab6d728396c0dbfb2f3a00e38df447091a20d21f1f9d442d03e1e34a3f07791083abe4a6c77f2681a29465482b4fd82191c6b929a6cfa6c031be511b14da86f7273a5f21e94c696b47c0ad2526abcff8e7c5c5754f9bf8374c4d8fc011575a3662239e053e205f5cb0c635efdea7e0953ac0bd17030847ba0b57b24695e0a7bc7ef1b8803f3e1c9a8e029f518729e6bd7291d9923721398ef4a73f0427c9ea67537b602b65fdd805000cac7ee8d41bfd68830c5b5a", 0xf1}], 0x5}}, {{&(0x7f00000008c0)=@llc={0x1a, 0x30c, 0x0, 0x5, 0x81, 0xff, @broadcast}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000940)="075fb36f8a511498458b8aa5cb9a6a2fe2d17c60557767ae", 0x18}, {&(0x7f0000000980)="2975318a3903e83a1de6d813989d99227f97c87b127a9db31a2383d484284de9cbb847a5874eeb6bc9a559cafe6ae339f44c9c86e234a3964605506c9d413c9d82ba490dd56650d882287ea137fdbb055661f2be9955d0a39cd0a9940051f110e4fcb97ca106d99e3314f6e6d54245e49c7a89ac0d84dc3d5370e2d91f984cd78d25ee7ce9bfd298ac6e41be483f2684a8398f3d1bc2348afa2f97b888b4a277c4094dcd2e8a87bc15ff412686e74f5d906fa3254770c5db3bdf09427a0441bbaa680b7378bdddf4639963a35b086c49b67a55b58555e7472856f3fbb0fceb50b89efb3a09bfe73206765d34021177184caf", 0xf2}, {&(0x7f0000000a80)="5eccbc05c148d7f73489fec5cb3f875e708408accb6f9919433163b3977da6f715d8fb8d6ab0d0011a5ad0d8d103ab3f9488dd29e6d2b117148f66db64065877b4fe9f057df911ef26b81687d4b0ad1d0dcecf9616f514d992968d2225073e0119012546645e8fffce5f504a9c26caa3817b06cf560bdd7fabbe63947bbc9577d141d981c0083df0f0621803bc18ceda1065bf8892775be9a244307e55a514fd8b5338e0d8be19dfd9", 0xa9}, {&(0x7f0000000b40)="4f0935fe4d8185a60f0a1eb0afee0299ad56b639754a34e23baa101f6dac14d3df0b9b5c93be549b4c376478dc28e0c1e8886bd0298313e44141433995c92a61b9829c6f91ad9a8ebe379ab82feea4d0f7dd18d498c287838ea043f174a350ab84d027ef9e060cc02c8b333f4aafea292ac9178d5f7d318694a08a9782c73ebf0e58178d52f58221887118597fdbb4509b0a1747aafee48626545f9131565e81aa861f5fd6686e29579292577a", 0xad}, {&(0x7f0000000c00)="213edf90ef8a2f250d7ea3014f84bf0254af4041e9541f0c1e77f62d98f1dfe8131738444034962a532b9006cd958a1bdb2144e3633c0b7fdb8a07a7d32a57649f42fa027da6acc5d9fe159c263fc6ebc8627a7b4d63d6605f79f5169adf5c429f0da38bcef01d564fa30a6fa1c0d3fe522af8bd13147d49d82280526551498f5c8b181f39d111c57d2556fcc5b4b606af64712aa2c1308125ff8a83601a7163f1f79e5fa31ca7c92576bf4f5aa6b3ae1ec50ba25c55d786c4b4262b40d133c04ea91798b47942ebca6f053880065952359e41d46a54e0cae938fb9304cb7db814c3", 0xe2}, {&(0x7f0000000d00)="9a1ed81483221545d094534cd614d72edd055ae35a5670094aa30d700b307e2b936e2f722e89c6e179752921a99c5014f737fb95a797e732b3385780fba7561ae5e189bcef78118769c9b0ebbe57cccd1d5e7cfc0442a4953470ee223498f9e202428878ec792d5feab12b154d6008d14d3cc3baee", 0x75}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000d80)="7376d68e36c73040006d44ea03c39c24cfa5828d1fd45705b5ef0049b1e42b890e3f2a91c510721fb129ad67a49c57d65d24fc2226483f750e4e50d1a1a7839c78429fa81b91ecf80c97683de9bf91161a1f8c66854b6d991cd0b766a2ff11d0e9a07a716fed39b091197ae3fec6e13be93d9a2cf1e521497600cf5b5492f424ce73cb58ec565d1bdc", 0x89}], 0x8, &(0x7f0000000ec0)=[{0x20, 0x6, 0xffffffe1, "ceb4c7880c3b785c7a42"}, {0x80, 0x113, 0x1cadd5e5, "b25d9a07f6b4b9b4f952836be1576e55223146732357ea6a56257295eca0a40a0fcdfd1458064c46e5350df873c4725dba275ad09a6592c58aa242a38099ced00e799ddfabd34ac4fd1cdd0a1736419248c99413dab67fa88572e68ad773400a3a0c0df863110a85d7eef48b92bf"}, {0x98, 0x108, 0x5, "ff5e295c31d8423a1005e54521fb6286d212be71feb4b14cf59bfa733b9e142e78112f47140b37e5d74e099c2591852fa2e6eb7c594d013ee95b9d48edfdc5c4d6cf4fb874e34232c9c26ca3f55d69aaa642706db90f8d6a0f2b31d4f22cb78213dbd60641df7dd13c203cb8801cc462cc24b3b348ecf74007241b02e9076074e48bba44"}, {0x110, 0x0, 0x1f, "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"}, {0xd0, 0x115, 0x2, "5603ca51b2581a5217898e3d74fcb641450ff8427da9bb4e64daf94b38be7e368ede01d5130a8b2a7e3fa0b8458696945ae44e5c21aa13c6f3c8aea87b7d641ec1d64dfe84fad0ca65699e21402b96664e77e712541de42ae0028649080bccda6b0485cd013b55540f3cf274d4d635af3c9787cb46528a072e5d5ce2f0854f20c506b1bd2ad7a0e671cc19d37b4da76d2f05698849fec263dd0466d52f5a80b05196b0408b9b89efd54bcf81b4bc1c09f83da8b9bac85ee8e3"}, {0x50, 0x0, 0xe45, "d352281b77b213ee7cb30c2637028741a1aa78789be2a5177ee4c076dc624d61a58d182896b317032b9289c1c3300e7a8160602aa9cc42b78767c1469df072"}, {0x18, 0x105, 0x5, "a19c98"}], 0x380}}, {{0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000002600)="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", 0x1000}, {&(0x7f0000001240)="e19de3331f603f1ed5527cfdc66f3639c160f20f27f6fe2bd6a48b686dcdea36b56978ad87d40d6831db79538b26c707673ee118c94f2ed71744ca65b20bf2f4c6a242c6a71e553a25f4f624414d28b3a3fd3eb39e71fe844cdfa16b07c4a4ba11451ae73407b355be7e5f4bccb5c8fb3fb64e37b3db8bc0ee7882a010d8aead49c58507da0b355667f402894f40a1ae", 0x90}, {&(0x7f0000001300)="162729ff9c34e899cb636ab7a045ed9ed14b8501c2345e5d904c48a81822458fe179f09d1abf667e", 0x28}, {&(0x7f0000001340)="4f1a333cb52c837deeaa3e5d9b015b4b59afac6999f02fd68d530466f0b0dc6ca8a42d91e76412e0ebfdc7a862a3d761bc4d3155c5814d48d4fbf6f58b4c83508f275223b87a05cda284ce1d9a8c0e0520c9fbe86ef7505fad0ee76b5705c45a84adf9244dd351c3faba262dce8ad98fb235073430d5769320e9258e9d4a308afca90aee0b0ffd505b7295f9c556dbe6edd932b3698dedfdcb65e20b1e70b3a2b9247384b7cdeb12b3e2e65c4162a0dd750cf690b36cd9848265202f4da0d6a97a1f8c481fce0d870e2585c1a5d3318b67100081850a4847eaa38d792cbf9c3f11acbd85af8ea9017583aa9d2b337ae76ae6", 0xf2}, {&(0x7f0000001440)="d2cb8a27449d8cd95456f0ce8ea9749382ede9adbf043a2b3e9e540202b3a68a0ea568e4295bf362b5f163393fbbad71f48cdd8b011f9a58dc995063af8961efd5c45f3d6daaa4fa5efcda0314a229751edccc2c7fdc7e1e37f8b70eac78ee7675eb22340713d473b57f27e3b32724fcb99a2374a3ccd163458dedb0f1e07878ff64e3b05012fcb1371a2e792d03665ea780f2c267cf030cef0c6e5956c2790eb860ab19b60f3938e36cb677ce7715e789ee2c1ba0b75e08e4e0ea", 0xbb}, {&(0x7f0000001500)="6693dec3e93d8a8671c5ae308b142b766f3d3a40e6edb4419983d9c79eb0e25e6e60e91d3c5f256a502657df24802eb343482d299d820f98839e6e0dc5f3b5aafb384e00a786c1624b0933f81fa17b2be85aefd97ee0e6c2fdd7a60a1eec0e44f8ac475d79aa9b3787da3c174c024bc738ad641adabf4c1d5d7cb1f592117c82e4c3991d8c", 0x85}, {&(0x7f0000003600)="b965bb4750f0a89d27333b5bc62172cc083446a7a5f32659320bef0e7ae6ebe55bb4722a48d142e92e1bfaf2dacc7264aed5cf00d8d68f1cc1152c9027767809bc813fb23691dd82c7dd8bdf4fe178f8749f8898d67baa83c8e8acef55edb95c5b508f3f9c96ab797af31386022fe7d4aac647e98c8072b7e50d37e99c3b030c0f64cc3e6597d5a0d23ae5a2bea464b854fc9f3de3c01c60a744b3ce61d01242dee4b463c347bad06a7d5d3979aff41f2fa7023eccfeb3e21dd0352af402641ab7f45110c6ea673a61c92360b4896d1ea4aea9116d2b980bdf5433745ce40116109eae4f853e795664c6", 0xea}, {&(0x7f0000003700)="9e305ddd5b0cc77e5d02cd4c42f6ac047e4cc64a1c19f1073fcf0132726c9a920f245e16ece0a2b137be1c58faffc6830abffea65d8b3676339d9becb4f9d8bb3aeb25119a52c72d4a85e8733dc063d7032865c764c7333a17923d8eb5a1091c28961262991a8f15e61b3f72", 0x6c}, {&(0x7f0000003780)="1dbd8b1cf3d39c639cea1ed4f9e6c5781cd4ca377a9349474e480f9af0f0df35ba0a43bc485f456ecd40a797b49ea75a5d3f07d46f55f2b9ef56774e18d19ec9520fb660698c17cdb711c382be4ec5a690c8a0164ecdf023bd1a0a34df23de095330be2e571313b9b69b75c8c9a7be624694bac3229cd53cec426fcecd408d0c9e3e10dfe452de352599a2084919941a6110269a99ea664cff679de7b64de4f62e92088184353a3047ac1045157a6b942e1317d064b829dee5bde9cb39807313205472706749e4ff442c63a67648d37ea769cdbdd64c68a9238578954833127282567172ff4db19fc979", 0xea}, {&(0x7f0000003880)="d8579b22242185e279595945b79a760027d32d83dc134f781de06b80be834272aef8690c8f899451397b4256c34451e0e8f4405f07ba26ecedbd911991313eb5ebe2b9022d6ff29118601d455d5c68ace02fcfd1d549c455ae07294bccd93f2ca4b1edaacb072b00f224ed4861948c6b6b3d1a944924fc66de0d8db968948428f2aae0393a0468f49ffda03928525ad601905b9d49a0", 0x96}], 0xa, &(0x7f0000003a00)=[{0x60, 0x88, 0x1, "b002f665db8390c2f641f9494cfde7f6eb7453047e4e4e2994ba38086514875da623b138288674062efa8e2e164ba46096932ecec5b6c8f0c84cf74b945de0279c8e73161e115a522bdd38"}, {0x70, 0x1, 0x1, "849bede89cdbdc5c02027e11b3b44ece0b152ffccc465f008d855c1a6fea6ba2fc6a619914b9cce96cc1663da83b293b59c091a23edadc3c72747c73cc8d2ff1dc70f275f35e3005d9c0b07a4a2dcbc03fb4eadc9e7aa57b764fba"}], 0xd0}}, {{&(0x7f0000003b00)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x1, 0x2, 0x4}}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003b80)="ce8eceaa36e8faff9d55c1d867368e7230e459ee5e819f8fb0255cd5c9028574082864eb7cf64cc83a0ecae0e1bf06f97d5ced9ba41e101f1aa9ca904b11fb13a67c355a676260f1f25147d3b9c4b89711a378be8c8ba1d26f710b449eee172b431dda8d6451084c3c402aa1a4c358d5d5adeaf45157516a9af2b532381ac58c22697f65ad6d5769fd4780eccde5815b8fc51f4089431ac9c1d19b548584922a40f930101a343883083c5cdc0c125cd96c21b47031404f23cbdb501e83dff24c5c7fe2bab019a372205805be05e5512510f01be54189647b59869377", 0xdc}, {&(0x7f0000003c80)="64184c4307ebbd2d1971de7e63ef5c117ed31172dedeb076afb0b29052d04e9a12f17b6e280bb761c93ddbbedc93aa7ffad5379b5e34ca39347bdfab841cb8167667704361a9846e8c4c413fed0707b77057c12b925a6f8864285853273d4a6be7284c2dc3e46973bf2743f5976a8a3d9fc59326006293635215e099a968452f23d52b37c2e288f280e0fc2a73d823170ad524571491cd46a849dd7952f4fe995965304a3495", 0xa6}, {&(0x7f0000003d40)="45d4c678157922786f6d1a815c1248dbfac03dc1e517317f4385b093938dc26818eb66558d8deaa6b19e9f53c2535cbef70e6b576b3b29a77dccb8489e000605", 0x40}, {&(0x7f0000003d80)="9c15ce74502d831c712ec638b5cd7284e2f648dffce24153c36620e4e817476e3052cbe4a966965ef6bb3a8b392ea1da4baa4e5c9e032f2ce1c94a52721a114ca50b9c3706d458b9166334f3ba8acf7efcb670e7f16e51ab67ec63bc16a56d559ee34dbef03717ea8e8f7544ae41371edd67ac832dc0127e562591c5e1b0c38e2bc12868b9d1734496ac90c6e3fd45535ca3b6670c2e943e5de85d9200a8d7b901dff6b8", 0xa4}, {&(0x7f0000003e40)="1a96438217a2a63cd2f4765d981f333a10d30bde9581b614be5b11faf817b653cbef52a63b9aea0f651189118dc9f4", 0x2f}, {&(0x7f0000003e80)="e4bc033b2c4193f6869dae4322bc443c1f356032d9232f0544a4b92ec48b2b04a5cb9f99ff21b00f1bc410fe5568c1099ff06ba0f8a1efdcb7db5b96baace9c9de863035fc4d5e52c878a36fc10181dc0780e9a6bab29bf4b4e5f625a296a7792bf3bd94768b7ee75e0727c8bfb7a05d22186d1d4e6a30cf85fde89386b713692f", 0x81}, {&(0x7f0000003f40)="128f8d84e10895f7e18a37edf150df169c38e4", 0x13}], 0x7, &(0x7f0000004000)=[{0xd0, 0x10c, 0xff, "9b0d39782a563f32f15d069b41759441155e795c3b5a35409b504d0d5903bfbb21e60722b03c44caf2722822920ddf545bd6b9f66c1fd04a91c41ab20e64e4e52ad9fb2ecef0e05fcd6a429442bed90a3cfba57de22064e417b058c66563dddfa6cf9bc7b1525d1ba52b14470f191cc6ebfb3cb5c1846f5a7e27c411b6402e049707285bae8f531ba0bdd1eb73e9767974a40eb41e762f9f9d56251f30b175be1a0456da53ca04d42e45db27612af5390f4469faf7e7f57195156ac9e8029221"}, {0x80, 0x118, 0x0, "cc88b2b5a3e1e2e92287afa59578003f5e291d59daf307469efa4e1617a328413067bc7486977284ccc1047738344e9d0dd639f65d0b69360f0c33176d9b72d910d8f6bd57670b465c96172e866b14baa7580e5b87e0e620fab1630fb2ee56ff8440c7e4d23db8d856"}, {0x50, 0xff, 0x3, "377a34f23e2377e6a436bbd920395f604f9c03c391867e5c8e025fb5f2fc0875f3816836fe240e37b494a97ac3411eaa62a8303c4a8602d4df"}, {0xe8, 0x107, 0x7, "c7cbf2f516c8b38af0c2a9dcb45c7c01f80e65c17ae2ca63efac9b676d29fd34d4869f06ccd4c9fb8feffc60b91bc0dacfa416e4a3486ecd561302df638d6c893095e2173d1aa339aeb44bcafbc225c1264bcd3bcd5033ef468f346c21b1d753f1fdad3386040d5681a02fc9c916fbc9d0be21f99108c2006c06c7609db8c1e5e93bfd7031c578ba11551ef77cf4a8f9ff1e1c0531d5ae14149dcdcd6c6c48d54f6a4d835fd7e626c936d215765dc6b7af6b1ee345eac6c55886062b54da7460c29ae0ebe6f5a9c6dd232fb4fad66f5e781ac8d44d23"}, {0x20, 0x117, 0xfffff801, "b1d59bc0f4bdbc8e3d7d"}, {0xe8, 0x115, 0x797780, "9a22691ec917436d363f18aad90da1b01ab5270c4cac80c15f14e613454e0b74b7409942a7dbf43c33b15b4197ce3240de25463439307903812731b8e1abe7b662c397fb67aa6b6cc736006414f86b5a11f87f5357856d4ba39cac74226173c6010a2ac6bdc94ea77ccb206cd4ad187ba855982a4bf800b2cba9b5a4abaca7bf5f7a3fd416cd279875c395dcf146482d298b93f1d02a5235f55727370dd07b1e07f90f15b02282bda8acf517987ee0257f830f4e2bbf72f1fd28f44fe6662760f06e5150cdfd4d666cf95c8def0788eec2"}, {0x2a, 0x112, 0x7, "2af864ebf968ab58e1d9958726fbecbabf922fa1fdd4856d551b7e6d9321e0"}, {0x100, 0x112, 0x0, "1ab6c161be6f1b5a4b2f7e08997ff5a7d6a16d318056ce08dcb8e386e9512f5cff8acff8a8034ba2ed65886bd407dd9c0639627298c2b4bbf78aca3ab6d2a6af6a3854873b35bbdb32a5ec0560c46cc837b2306e40a61d9cdda28012a2cae9551b227762616c4f3764e40a4f7a5e872bbfcb2f10225e95835c80497fe8d253cdfed197077fa072b1339ba907797b3b1aa4bae40b3cbd31623304482890b6f71d22650c6a720ffb61e5c21b4519c91fd03bfcefbe8af9e0e55d28b34d47315a6340296da57801364ad18695f12a076a1a218c1f46f774bc5dfaf6cfe98c7a61c05b22e2fe8daadbd93b4d"}], 0x4c0}}, {{&(0x7f00000044c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000004540), 0x0, &(0x7f0000004580)=[{0x50, 0x119, 0x8, "ce43a485ccf0f3f9c682d10b817a8cf95fbc9986d4a4a6a836e1b3d135a95c73f3556970825918760094e5ffe79880bfc18ed51953a445cb23a13412435081c1"}, {0x1010, 0x88, 0x0, "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"}, {0x90, 0x111, 0x0, "70724538493502eb8602639787f8762c0c78a6994b71d76dab1a47486a33e9e5ced52be6a43bdba0ca9fd6739452e4bb3bde560e49b4df73bec078bef09729e65d0e00790c0e34e7ec3a4f396eb069bd9ae898a8015fa0ce00ac9159e8d613b3cd089529a1a16f16d71d0f7fe364d3cd918834477947c20f93033781aa9b9c99"}, {0x110, 0x1, 0xfffffffa, "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"}, {0x28, 0x101, 0x3f, "2b2b6f2f2835489bc4c800f143797fef683cc1c4a9"}, {0x80, 0x10b, 0x7, "c88dff08998244c5120730f285b7ed6135e1ef20c7fc35a3fd5c0eb9f0c761c4f49ca2e47723af2fa8cc4232b52fcb7b2d6f16eb3ab6d413997f407de85cd579d7f0ec0b62dd73749a0062049e427ff5cad63d263ad130d0bfea36b7b2f001a9c531502329a48a5d40cbc143307b0e6c"}, {0x100, 0x88, 0x1, "ac2406bef9589f745cc1989f6201e7d8f21d972e0cc8f2fa80e6c4826fa82b539847a3795585bc3d0f5ebe32a6f41dc93da863140f447b2a9a896481c0aa27287b9ff8badba25cd6f04fabc420dba23fa34a626a4edea15c08360234522d906404d6867a44babddea3d86f02488f4b36369098334cb528213a5f571b638582097531bd8b2b1227f0c7dd90c456ccac73014dc2c137e29a6a2e6e1e719f5344f56b03bf163f21a9ae29b2305aff6d25a7f8ab5382a7c9ea33f0dcfc3b9babb2031d979d6104cfbe4cb9baa4ad8ab9afcea435f679c7aba302329913c2663f677a66847c9ed3f11677f9"}], 0x13a8}}, {{&(0x7f0000005940)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80, &(0x7f0000005cc0)=[{&(0x7f00000059c0)="5603", 0x2}, {&(0x7f0000005a00)="ca8ffe9f9814e14c53d0073c7b843074ca231e802a6ca742b7ee6f225b8623e04029366524f8fdc27d5c5e2cfb77f4a91afc04180e79d54822ed0e591feb22836887d799632c90b7b43b63cc4ed3d0efd7301b59d578db01d44b75e7767f980ebf4819e88d567baaa1289ca9473360d81747381f8d0e8b19da2d97", 0x7b}, {&(0x7f0000005a80)="af9b351d9eab0408abd52395ba4eb691a02ee0e3231e2a3c0df1", 0x1a}, {&(0x7f0000005ac0)="7cf0b0f5cc9821758d700536c0ab6824c5d510a2aa6d3a46e7450c8c5acde80831bdf515a31f04318336707b030edb16e0f337fb0e7d63dfff15e4e9dd996444ea9039a20acb1c57887947976deb3c69ff08d30598c126be6dad2322fd5000358d5c0d528cbbdb3d529e89d67f9d43ec7d8372952c", 0x75}, {&(0x7f0000005b40)="113818555e34b0a681146c713cd7a897931a2bcface1f96d65ec31c4491b125a07240f2fb5756e5e07f12cc817d2be876259d93b18799dfb7a29b3e052a5694f31464cd8b5bd7334bb6cc32f928877921d40ae6bf99803573dda71007fd341b7c113e0ef", 0x64}, {&(0x7f0000005bc0)="7e22658442be964aee2d3c564b347dee3cdbf258b53900b6dd48", 0x1a}, {&(0x7f0000005c00)="4acdde715daa8d82efdaa404fec069df57540714531d4cb92bcfcd74a31dd40a0d4725acdf83b4b47b1a6f82d6327c421cf20134be5adf3075fa3a67b70540e5adc19a072908e4fed89e42b9abac89e537a05b9c2784fa6711293cbbaacc6eb29a2c017c8ba9b7fcb8c81b252b92551ccd50d3a8ff778ffe2f89f676e805a2a76e1dfe", 0x83}], 0x7, &(0x7f0000005d40)=ANY=[@ANYBLOB="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"], 0x12a8}}, {{0x0, 0x0, &(0x7f0000009380)=[{&(0x7f0000007000)="5f4916da229619269fbc521283f8253e03d8f535021f4b1964020fb4e103226b62ba47c980affc8d45874defee18ed592289985645f6dcc9bd1879f652588886a8e0da891cfabd9c236a5e6fe0d3fbd1e50d6618f919a03db959ee516da9bbfb810c46cde03e23ec61", 0x69}, {&(0x7f0000007080)="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", 0x1000}, {&(0x7f0000008080)="df087a4f31ceda33936fba3922d32af7b4de07b090e04ae3f48c80119be070d9ab98527964", 0x25}, {&(0x7f00000080c0)="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", 0x1000}, {&(0x7f00000090c0)="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", 0xff}, {&(0x7f00000091c0)="52601d42da3570a36f5d9357c7001b8e5f1efc21", 0x14}, {&(0x7f0000009200)="d4af91daa383e8fac440cb63c995979337a07c28c680070aa828b4619e9585ec68e61c140d2ed36f7f6e5bcc2104da4b1ff183731a2e952aa209437b0d6b32d8caefafd95661905d23306efaa4510ae6d5e1cae54e4a82c64a06d0a409ce0ab6c3efa3b6a15495bb509ab293132de40c239ba201ebdbf9a4f3a1450b4f5fe2910f46bec6b17644dcd7", 0x89}, {&(0x7f00000092c0)="ae24b1f999884d411a82a536a7c446614deb521a4a93905b18babafb7eb34a06bc3d8022ec8eb4b649d869f8ae3ee40cef3357d5f7743ce0d7b9520a4d8986a0105f7f116488fbf76caebf", 0x4b}, {&(0x7f0000009340)="ccbe864e0db2d65b438484e939a65aee0f5b77f4694c39f03179d10218080f3fb0ebc9322d36181ca68f22eb6bd179", 0x2f}], 0x9, &(0x7f0000009440)=[{0xa8, 0x115, 0x80000000, "04900dcd316e7dafd7153691982a5e1ce4c1e05c0fa611daa93fac61b9383789ddd76df037855ad01245aef7421971755895fe88ff23d44b734113214edecfca08acc2e2c9b820d01759dffca7e017d2fc55cd11b7311fac7c8a9665db96069ee7c0a27e74e3683f80181ceb0122085def192e418d0590a1a7540d14e5016600837770b0ff7319b11c918b87634c55e093"}, {0xb8, 0x10c, 0x6, "5cf3149d5d171cd5208116fbd5f4e808a9932b3647c00aeefe8b6bec605485bd4dc7e337037c0d6f962f6b5f7052f2be636d98800661d53321ddec235dbf46271e3fd78c8d61e2d17ef6c9cf44f30175a87c5091a77fb3e0027916d382845e592ba5c32af547c4a2d37a9cf50ce0feec0c24b91b9284c73360735f3b9814d8b696fe35636627ae0361b43c8dda33f82882ed92614cdb3df4afca6cf6fd4070d906be4235ffd476"}, {0x10, 0x116, 0x80000001}, {0x68, 0xff, 0x4, "719382a57dafebc0fab0b76ca73c1e8792989ea493ae06850c438cc4834e2e8830038c3719974daa6732953cacc0dd5a91562d6476765f8930f27115010959ef93e777d9d2e5139fe7643498d86328bc4f538f49b188cfee"}], 0x1d8}}], 0x8, 0x4000000) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$VIDIOC_CROPCAP(r6, 0xc02c563a, &(0x7f0000000040)={0x1, {0x1, 0x5, 0x80, 0x7fff}, {0x400, 0xffffffff, 0xae1, 0xfffffbff}, {0x3, 0x5}}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000009840)='/dev/vcsu\x00', 0x14000, 0x0) getpeername$llc(r9, &(0x7f0000009880), &(0x7f00000098c0)=0x10) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000004540)='/selinux/relabel\x00', 0x2, 0x0) ioctl$PPPOEIOCDFWD(r8, 0xb101, 0x0) [ 1351.322315][ T5828] usb usb9: usbfs: process 5828 (syz-executor.2) did not claim interface 0 before use [ 1351.353019][ T5830] kAFS: No cell specified 16:41:21 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1351.448072][ T5978] usb usb9: usbfs: process 5978 (syz-executor.5) did not claim interface 0 before use 16:41:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000180)=""/173) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1351.505695][ T6040] kAFS: No cell specified 16:41:21 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'broute\x00', 0x0, 0x4, 0xb3, [], 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/179}, &(0x7f0000000040)=0x78) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000280)=0x9) 16:41:21 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1351.597320][ T6123] usb usb9: usbfs: process 6123 (syz-executor.2) did not claim interface 0 before use 16:41:21 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mremap(&(0x7f0000f86000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000161000/0x2000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:21 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1351.722036][ T6163] kAFS: No cell specified 16:41:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:21 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x44, r3, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x200c041) 16:41:21 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x400080, 0x2) inotify_init1(0x800) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f00000000c0)=0x1) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0xffffffffffffff8c, 0x20000000, 0x0}) [ 1351.867449][ T6355] usb usb9: usbfs: process 6355 (syz-executor.2) did not claim interface 0 before use 16:41:21 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1351.930000][ T6358] kAFS: No cell specified 16:41:21 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:21 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:21 executing program 3: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1352.025393][ T6381] usb usb9: usbfs: process 6381 (syz-executor.5) did not claim interface 0 before use 16:41:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x78, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREMOVE(r2, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) [ 1352.133156][ T6496] kAFS: No cell specified [ 1352.179820][ T6545] usb usb9: usbfs: process 6545 (syz-executor.2) did not claim interface 0 before use 16:41:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x410541, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x20048800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) 16:41:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1352.334418][ T6673] vhci_hcd: default hub control req: 0303 v0000 i0000 l0 [ 1352.359253][ T6675] kAFS: No cell specified 16:41:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1352.463840][ T6745] usb usb9: usbfs: process 6745 (syz-executor.2) did not claim interface 0 before use [ 1352.469960][ T6730] kAFS: No cell specified 16:41:22 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb, 0x77, 0x1, 0xffffffff}, 0xb) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f00000000c0)={0xa1, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0}) 16:41:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1352.581466][ T6853] kAFS: No cell specified 16:41:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) prctl$PR_GET_NAME(0x10, &(0x7f0000000240)=""/168) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xd, 0x0, &(0x7f00000001c0)) recvfrom(r1, &(0x7f00000000c0)=""/195, 0xc3, 0x3, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @loopback}, 0x0, 0x3, 0x2}}, 0x80) [ 1352.674892][ T6887] kAFS: No cell specified [ 1352.682193][ T6886] usb usb9: usbfs: process 6886 (syz-executor.5) did not claim interface 4 before use 16:41:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1352.743390][ T6889] usb usb9: usbfs: process 6889 (syz-executor.2) did not claim interface 0 before use [ 1352.813548][ T6974] kAFS: No cell specified [ 1352.814843][ T23] kauditd_printk_skb: 19 callbacks suppressed [ 1352.814859][ T23] audit: type=1400 audit(1579970482.684:2164): avc: denied { syslog } for pid=6888 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r2 = dup2(r1, r0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000040)=0x50, &(0x7f00000000c0)=0x4) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000100)) 16:41:22 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1352.928179][ T7081] kAFS: No cell specified 16:41:22 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1fd, 0x14b100) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1353.001544][ T7097] usb usb9: usbfs: process 7097 (syz-executor.5) did not claim interface 0 before use [ 1353.068535][ T7100] kAFS: No cell specified [ 1353.073841][ T7101] usb usb9: usbfs: process 7101 (syz-executor.2) did not claim interface 0 before use [ 1353.096002][ T7097] usb usb9: usbfs: process 7097 (syz-executor.5) did not claim interface 0 before use 16:41:23 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.125460][ T7113] kAFS: Bad value for 'source' [ 1353.135974][ T23] audit: type=1400 audit(1579970483.004:2165): avc: denied { syslog } for pid=7099 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:23 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) recvmmsg(r1, &(0x7f0000007a00)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1}, 0xfffffffd}], 0x1, 0x12000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 16:41:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x101, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x1, 0x10041) [ 1353.325716][ T7208] usb usb9: usbfs: process 7208 (syz-executor.2) did not claim interface 0 before use [ 1353.336722][ T7209] kAFS: No cell specified 16:41:23 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.407725][ T23] audit: type=1400 audit(1579970483.274:2166): avc: denied { syslog } for pid=7206 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1353.409220][ T7214] kAFS: Bad value for 'source' 16:41:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:23 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$SNDRV_PCM_IOCTL_STATUS32(0xffffffffffffffff, 0x806c4120, &(0x7f00000000c0)) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x28db, 0x200) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x60, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) 16:41:23 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000}) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x824840, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000080)={r5, 0x80000, r6}) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[], 0x305102) r7 = shmget(0x0, 0x4000, 0x4, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_LOCK(r7, 0xb) 16:41:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.603825][ T7418] kAFS: No cell specified 16:41:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40900, 0x0) getdents64(r1, &(0x7f00000000c0)=""/15, 0xf) [ 1353.633010][ T7420] usb usb9: usbfs: process 7420 (syz-executor.2) did not claim interface 0 before use 16:41:23 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1353.673864][ T23] audit: type=1400 audit(1579970483.544:2167): avc: denied { syslog } for pid=7417 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1353.743177][ T7452] kAFS: Bad value for 'source' 16:41:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x2, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1353.772531][ T7494] usb usb9: usbfs: process 7494 (syz-executor.5) did not claim interface 0 before use 16:41:23 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:23 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0xa003) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x1, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1353.842876][ T7494] usb usb9: usbfs: process 7494 (syz-executor.5) did not claim interface 0 before use [ 1353.858710][ T7630] kAFS: No cell specified 16:41:23 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:23 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x44c400, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x2, 0x4014000) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="084c111da88d7c29"], 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000500)={0x1, 0x101, 0x4, 0x9, 0x6}) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x122, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x7, 0x4003}, r4, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) fcntl$setownex(r2, 0xf, &(0x7f0000000480)={0x1, r4}) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDCTL_DSP_GETBLKSIZE(r5, 0xc0045004, &(0x7f0000000440)) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x0, 0x80000000, 0x5}}, 0x28) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) recvfrom$ax25(r2, &(0x7f00000002c0)=""/133, 0x85, 0x40002102, &(0x7f0000000380)={{0x3, @default, 0x1}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @default, @null]}, 0x48) r7 = accept4(r6, &(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, &(0x7f0000000240)=0x80, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r7, 0x800442d3, &(0x7f0000000280)={0x0, 0xa9d, 0x8, @local, 'syzkaller1\x00'}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x22400, 0x0) ioctl$VIDIOC_G_AUDIO(r8, 0x80345621, &(0x7f0000000080)) [ 1353.930820][ T7675] usb usb9: usbfs: process 7675 (syz-executor.2) did not claim interface 0 before use [ 1354.005717][ T7721] kAFS: Bad value for 'source' [ 1354.022078][ T23] audit: type=1400 audit(1579970483.884:2168): avc: denied { open } for pid=7719 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigaction(0x0, &(0x7f00000001c0)={&(0x7f0000000100)="c462a50091d0000000c48259bafaf3430f1bcf26f04380b3000800001ec442719ab70010000047d236d9f745df4b25f0818a60cf0000ce1d0000f30f1eed", 0x8000000, &(0x7f0000000140)="660fe71f3e66430f6301c441ff2ce36567400feda10a000000c48228f2a4e5cfd80000660f73def065f20f1a2c9a67f2400f2d33c4828daa2455da4cf826c422754532", {[0xedbd]}}, &(0x7f0000000280)={&(0x7f0000000200)="d9fac4c20d2e4c7ca9c1578c0d400fba7300000f1c012e44d8b500080000f30f004445018fe848b68e81000000000f18d1c4017b2cbceb0b000000", 0x0, &(0x7f0000000240)="660f38333667f341c1e6b4662ef3460f1efb26363e66400f38dd4f9dc4e21d2d770dc4a2fd2b02a5c4e1ff124bfff20f2aaa0800000009a2ebb00000"}, 0x8, &(0x7f00000002c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) rt_sigaction(0x31, &(0x7f0000000380)={&(0x7f0000000300)="c4c27d1d200f01dbc482d12972d746e1ff65f0420fbb06460fc7f8c4e1dc54a2feffff208f090895cf43d07542440fc7a107000000", 0x8000002, &(0x7f0000000340)="0f01c1c401fe2d2494f3aa430ff69bafff00002e3e470f74beea08c83bc4429d375d7cf23e2eecc403f9631800c441b571f00066400f38df5932", {[0x2]}}, &(0x7f0000000480)={&(0x7f00000003c0)="c401cdd01a8f0870cdf204f3f26636430f0fd2b767f0448394c3ac62000093f30f01f9672e6745d27b007b6bc442ed9c13f3460f2a32c4817d58a5ce000000", 0x0, &(0x7f0000000400)="670ffbd965ff2bc403bd7d7d1d00c462e0f2ad030000006664430f8aa60e0000660f643532000000c4a379639e9417000000c442c9372ca4c4623d014f000fae6300"}, 0x8, &(0x7f00000004c0)) r2 = socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) fdatasync(r5) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000500)={[0x3, 0x50, 0xf898, 0x5, 0xff, 0x2fb7, 0x1, 0x7fff, 0x3, 0x9, 0x1, 0x8001, 0x7fff, 0x7c00000000, 0x0, 0x5f], 0x10000, 0x1000}) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000000c0)={0x2, "98457a061ea531dae9699ec3d26e9b0ef67af43f0616e0cde2177198e65d131d"}) 16:41:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x2, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:24 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200002, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@remote={[], 0x1}, 0x7, 'veth0_to_hsr\x00'}) 16:41:24 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r5 = accept4$alg(r4, 0x0, 0x0, 0x80000) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000340)={0x10000000000000, 0x3, 0x2, 0x4, 0x6, [{0xffffffffffffff02, 0x0, 0x8}, {0x3, 0x9, 0x5, [], 0x80}, {0x40, 0x7, 0x5, [], 0x2000}, {0x80000000, 0x1, 0x400, [], 0x101}, {0x7, 0x2, 0x6, [], 0x400}, {0xf6, 0x8, 0xfffffffffffffffc, [], 0x80c}]}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1354.238272][ T7943] usb usb9: usbfs: process 7943 (syz-executor.5) did not claim interface 0 before use [ 1354.280920][ T7945] usb usb9: usbfs: process 7945 (syz-executor.2) did not claim interface 0 before use [ 1354.309003][ T7947] kAFS: Bad value for 'source' [ 1354.314008][ T23] audit: type=1400 audit(1579970484.174:2169): avc: denied { map } for pid=7950 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:41:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1354.413069][ T23] audit: type=1400 audit(1579970484.254:2170): avc: denied { map } for pid=7988 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:41:24 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x2, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:24 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0xffffffff, 0x1, 0x40, 0x6, 0x74e4, 0x4, 0x10001, 0x800, 0x5}}, 0x43) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_uring_enter(r3, 0x707c, 0x7fff, 0x2, &(0x7f0000000040)={[0x4]}, 0x8) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400182, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) 16:41:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvfrom(r1, &(0x7f00000000c0)=""/78, 0x4e, 0x10100, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x6, @empty, 0x3, 0x2}, 0x80) 16:41:24 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r1, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x581, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x94}, 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)='}\x00', 0x2) rt_sigsuspend(&(0x7f0000000080)={[0x9b]}, 0x8) open_by_handle_at(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="08000048f94a2a00"], 0x0) [ 1354.606924][ T8359] usb usb9: usbfs: process 8359 (syz-executor.2) did not claim interface 0 before use [ 1354.608737][ T8361] kAFS: Bad value for 'source' [ 1354.626869][ T8362] usb usb9: usbfs: process 8362 (syz-executor.5) did not claim interface 0 before use 16:41:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:24 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) mmap$fb(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x84051, r1, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) mmap$fb(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x84051, r2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f0000000300)={0xa0, "e407b3a34bdd8c53addbb7c55abeacec7fee5c78d4b63dde27513af44c22e34049d60f6c5b288d4acd551f61ba3040499adc70b249f44b09d04e1b4f4badac435fd60885215af0519e26bfeea916a2594444ca41aa6c563595a1ab335c47326b4a4ee5f1b9869affad84265b1c55fc5d1c3248d5c5eb0b35fed09213750320b2370c85eae391c693d2f0dca691c22826d9ef2acea8b3b54226b0a4a41efe01d5"}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = fcntl$dupfd(r3, 0x0, r6) sendmsg$IPCTNL_MSG_CT_GET(r7, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c000000010101010000000000000000020000060600124000040000081516400001000030000e802c00018014000300ff0200000000000000000000000000011400040000000000000000000000ffffe00000020800154000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000884}, 0x4010) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2c00000003000000000000000000000000000000000000000b000000f0ffffff46504c656d303a6264657600"], 0x2c) r8 = socket$nl_crypto(0x10, 0x3, 0x15) connect$netlink(r8, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbff, 0x8220001}, 0xc) ioctl$IMCLEAR_L2(r7, 0x80044946, &(0x7f0000000040)=0x9) r9 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r9, 0xc0185500, &(0x7f0000000080)={0x80, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1354.645382][ T23] audit: type=1400 audit(1579970484.514:2171): avc: denied { syslog } for pid=8354 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:24 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1354.742765][ T23] audit: type=1400 audit(1579970484.594:2172): avc: denied { create } for pid=8364 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1354.813190][ T8425] usb usb9: usbfs: process 8425 (syz-executor.2) did not claim interface 0 before use [ 1354.844781][ T8466] kAFS: No cell specified 16:41:24 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000040)={0x722, 0x516d, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x8}, 0x0) 16:41:24 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1354.861258][ T23] audit: type=1400 audit(1579970484.704:2173): avc: denied { map } for pid=8408 comm="syz-executor.4" path="/dev/fb0" dev="devtmpfs" ino=1110 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:framebuf_device_t:s0 tclass=chr_file permissive=0 16:41:24 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:24 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x260002, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x303}, "fc61c5a5f25119f2", "96152849a19091c334a8e96a5a18c5ee66fc3b056a4a610bc924720ec6678fa6", "13e3279f", "30e1e6d775666afa"}, 0x38) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$PNPIPE_IFINDEX(r7, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000280)={@mcast1, 0x32, r8}) [ 1354.991912][ T8522] kAFS: No cell specified 16:41:24 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000084) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000240)={0x9, 0x5, 0x4, 0x2000000, 0x3, {}, {0x3, 0x1, 0x3, 0xae, 0x7f, 0x5, "680ec052"}, 0x1, 0x3, @fd=0xffffffffffffffff, 0xfffffffb, 0x0, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80204000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r1, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x1c}}, 0x20000840) ioctl$USBDEVFS_GETDRIVER(r4, 0x41045508, &(0x7f0000000300)={0x1, "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"}) r5 = fcntl$dupfd(r0, 0x0, r2) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_ENTRY(r7, &(0x7f0000000580)=ANY=[@ANYBLOB="2c00046f6f694775a58aa0b2ad2d91b321086fc5fc176c7b38a3fc43d4000000000000000000c00597b17781aa00000800000b00000000"], 0x37) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000040)=0x1, 0x4) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r8, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r3, &(0x7f0000000440)=ANY=[], 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$netrom_NETROM_T1(r10, 0x103, 0x1, &(0x7f0000000200)=0x6, 0x4) 16:41:25 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:25 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000001c0)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:b\x85-\xae'}}, 0x2c) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000100)={0x9f0000, 0x2, 0x908b, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0xa2093e, 0x2, [], @p_u8=&(0x7f0000000040)=0x9}}) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000140)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) 16:41:25 executing program 2: syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000008bc77e63965d3235ef3d5e195d9ee1cbbf2ae2310ad859"], 0x0) r1 = socket(0x25, 0xa, 0x5) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:41:25 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xd, 0x0, &(0x7f00000001c0)) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00000000c0)=0x3, 0x2) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000040)={0xfffffffffffffb3c, 0x0, 0x7}) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000380)={0xa1, 0x0, 0x3, 0x3, 0x0, 0x0, 0x0}) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000300)={@broadcast, @loopback}, 0x8) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c004500a, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB='\b\x00'/14, @ANYRES32=r5, @ANYRES32=0x0], &(0x7f0000a8a000)=0x3) r7 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r7, 0x8000000000000, 0x40, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x3a0) setsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f00000002c0)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000100)={r6, 0x100, 0x0, 0x1, 0xea}, &(0x7f0000000140)=0x18) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet(0x2, 0x2, 0x0) bind$inet(r10, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r10, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r10, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r11 = socket$inet_tcp(0x2, 0x1, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(r14, 0x84, 0x14, &(0x7f00000003c0)=@assoc_value, &(0x7f0000000340)=0x8) [ 1355.519849][ T8791] kAFS: No cell specified 16:41:25 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:25 executing program 2: syslog(0x0, &(0x7f00000000c0)=""/187, 0xbb) 16:41:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1355.594355][ T8828] usb usb9: usbfs: process 8828 (syz-executor.5) did not claim interface 3 before use 16:41:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000080)={@broadcast, @remote, @broadcast}, 0xc) 16:41:25 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x1, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0}) [ 1355.703325][ T9049] usb usb9: usbfs: process 9049 (syz-executor.0) did not claim interface 0 before use 16:41:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1c1580) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) ioctl$SOUND_PCM_READ_RATE(r1, 0x80045002, &(0x7f00000000c0)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) sync_file_range(0xffffffffffffffff, 0x80000000, 0x8, 0x2) 16:41:25 executing program 2: syslog(0x0, 0x0, 0x0) 16:41:25 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1355.799840][ T9107] kAFS: No cell specified 16:41:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:25 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x2, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x24}, 0x1, 0x0, 0x0, 0x80c0}, 0x40400) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) setsockopt$inet_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000240)="e185a534e9f74433ba56d64842a8b5d7ee2cd198f26f4726a7063acd9bb8d693b7b12acb02127a46788fec3fe76e0f16a917b78aa8b65bdd7ef5fdc07fa88f12612c5bfdfab3e42f34b55cfc7a874d09bb4ba9e5dc29f3113c1dea518ac3a6ecd40cf4dcf652188e7200d8548576ad0637d391b8178d79a8af5f7226a91057b9ba2e266e2bbaa1573a3a5ae62042973bd44e7dff374f632b6158b7ade9a99df441d8e9845e68ce25a08f38108f0074d516b6fcd3f566b7f90e", 0xb9) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x200000, 0x0) lseek(r5, 0x0, 0x4) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x397883, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xd, 0x0, &(0x7f00000001c0)) getsockopt$bt_BT_SNDMTU(r7, 0x112, 0xc, &(0x7f0000000300)=0x401, &(0x7f0000000340)=0x2) open_by_handle_at(r6, &(0x7f0000000000)={0x8}, 0x0) 16:41:25 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x44c400, 0x0) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x2, 0x4014000) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="084c111da88d7c29"], 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000500)={0x1, 0x101, 0x4, 0x9, 0x6}) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x122, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x7, 0x4003}, r4, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) fcntl$setownex(r2, 0xf, &(0x7f0000000480)={0x1, r4}) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDCTL_DSP_GETBLKSIZE(r5, 0xc0045004, &(0x7f0000000440)) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x0, 0x80000000, 0x5}}, 0x28) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xd, 0x0, &(0x7f00000001c0)) recvfrom$ax25(r2, &(0x7f00000002c0)=""/133, 0x85, 0x40002102, &(0x7f0000000380)={{0x3, @default, 0x1}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @default, @null]}, 0x48) r7 = accept4(r6, &(0x7f00000001c0)=@l2={0x1f, 0x0, @fixed}, &(0x7f0000000240)=0x80, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r7, 0x800442d3, &(0x7f0000000280)={0x0, 0xa9d, 0x8, @local, 'syzkaller1\x00'}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x22400, 0x0) ioctl$VIDIOC_G_AUDIO(r8, 0x80345621, &(0x7f0000000080)) 16:41:25 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = msgget(0x3, 0x206) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0xc00, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x4}, 0x68) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000340)=""/4096) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0x4, 0x7fff, 0x20000000, r1, 0x0, &(0x7f00000000c0)={0x9909c8, 0x1, [], @string=&(0x7f0000000080)=0x1}}) getsockopt$rose(r4, 0x104, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x0, 0xe, 0x1, 0x2, 0x0, 0x0, 0x0}) ftruncate(r0, 0x400009) 16:41:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0xe, 0x0, 0x4, 0x0, 0x6, 0x0}) [ 1355.973768][ T9309] usb usb9: usbfs: process 9309 (syz-executor.0) did not claim interface 0 before use [ 1356.004166][ T9413] kAFS: No cell specified 16:41:25 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a15457"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:26 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1356.105524][ T9441] vhci_hcd: default hub control req: 000e v0001 i0002 l0 16:41:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1356.156888][ T9521] usb usb9: usbfs: process 9521 (syz-executor.5) did not claim interface 4 before use 16:41:26 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0x130, 0xfe, "8807f4548b20eaf6eda61555568083209f2cf201a1f4018d2d9f8cd17c9efeaabc9bd4549ebf0028229482825d81fdfa955c5de81b44ede0b36767ac2bff38dab2f9fcef363740207b680e1c8b67255b4c8ad1c8e8da47b46c1a95df67d16a3571da03841f2ed574dbee09368861abc20e1efeaa3d5dc6fba241a364a32eab9b56c45104a4f3e0a8a241a1feb731cd743be9c2937da6aa73728b0ae6917ec6c4aed53c64d3b46f3d28a4eb4a960cc92dde481a49d26dd8f89a06ad8b924f8045dbd921d4d73864a93ff077a1fda048ecf40d73db111aeff88b822b08fe43e9f7ddf20136dc51fab36c7ce6752553d046d7f9f92c730d556e9c72eaf0855fae22778d3e2d1bd2245aa037f7ff6c39a84132a1d1412e9345ca086ebba7a441b9c1ca7108f2e996ca7f"}, 0x144) [ 1356.197643][ T9563] kAFS: No cell specified [ 1356.214047][ T9589] usb usb9: usbfs: process 9589 (syz-executor.0) did not claim interface 0 before use 16:41:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:26 executing program 5: mknod(&(0x7f0000000040)='./file0\x00', 0x8040, 0x5) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x20081) r1 = geteuid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = geteuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='c', 0x300, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r6) keyctl$describe(0x6, r6, &(0x7f0000000700)=""/4096, 0x1000) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r9) stat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r12, r13) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, 0x0, r15, r16) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x0, r3}, {0x2, 0x4, r4}, {0x2, 0x3, r5}, {0x2, 0x0, r8}, {0x2, 0x6, r9}, {0x2, 0x5, r10}, {0x2, 0x3, r11}], {0x4, 0x4}, [{0x8, 0x7, r13}, {0x8, 0x4, r14}, {0x8, 0x5, r16}], {0x10, 0x6}}, 0x7c, 0x2) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1356.298927][ T9657] usb usb9: usbfs: process 9657 (syz-executor.2) did not claim interface 0 before use 16:41:26 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200400, 0x0) 16:41:26 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x78, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r2, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000c00)=0xc) setuid(r6) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) statx(r8, &(0x7f0000000200)='./file0\x00', 0x800, 0x2ac7e65619dfa604, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2000, &(0x7f0000000540)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@default_permissions='default_permissions'}], [{@fsname={'fsname', 0x3d, 'GPLem0:bdev'}}, {@subj_type={'subj_type'}}, {@obj_type={'obj_type', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@subj_role={'subj_role', 0x3d, 'systemcpusetmd5sum^securitynodevself\xbb\\'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@euid_lt={'euid<', r10}}]}}) r11 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r11) recvmmsg(r1, &(0x7f0000007a00)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x303}, "1f07521c732073d7", "94737db2361fc0ab68ae1194fe3b230b", "e7d08539", "5a6847179fc8d854"}, 0x28) r12 = socket$inet(0x2, 0x2, 0x0) bind$inet(r12, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r12, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r12, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r13 = socket$inet_tcp(0x2, 0x1, 0x0) r14 = fcntl$dupfd(r12, 0x0, r13) write$FUSE_NOTIFY_INVAL_ENTRY(r14, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$VT_SETMODE(r14, 0x5602, &(0x7f00000000c0)={0xa2, 0xfe, 0x0, 0x4, 0x9}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) r15 = socket$inet(0x2, 0x2, 0x0) bind$inet(r15, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r15, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r15, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r16 = socket$inet_tcp(0x2, 0x1, 0x0) r17 = fcntl$dupfd(r15, 0x0, r16) write$FUSE_NOTIFY_INVAL_ENTRY(r17, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$KVM_SET_GUEST_DEBUG(r17, 0x4048ae9b, &(0x7f0000000100)={0x20000, 0x0, [0x6, 0x62, 0x3ff, 0x8, 0x2, 0x7, 0xff, 0x200]}) 16:41:26 executing program 0: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1356.445320][ T9739] kAFS: No cell specified 16:41:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:26 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000580)={0xac, 0x0, "aeaa7f33462c8d0cea30f58c08fdd7fedf85ff43c7b4585fc0513b7cc60523a0ec374553e514f044c01c3a8f402fc83f72be2778970d0b5ca6a60591eaf8fffaf4fa8b4a0db87a748d8dcc3b7335440c39c8f210360acc3ce7c43c07193d947b8892c98f99ee00000000763a44a8202e66f33c89455f4e3687825c8c2ef96ee63a3f7e2b800b8e2ffc0d235d234766d15b2d33d6a54c718a3fa0c1ec141e6ff21021660b"}, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000500), &(0x7f0000000540)=0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) sendmsg$sock(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)="59855ce5af89b3f8a7e3f250c126f0abf43262ea74cc9a2f3d43fe151dc1df8d409796caeacffd92866dd37e768e33154597583690de8f3f8e4dee6cd730ce1f024f4c17951d55f228f83ee32468b684731088fc6c18cd4f737179078578bf9ea0b3b6da1af339791666a2e79347166b8b9da885e67acd697ef534208878ed3f06eec3dec3428c2ba68119aef2c3c3858b8915d60197cbb1c91fdacd158afa49c774a9c5ff7013ce7115c02d4194a27659599bcfe2b096e5f4f66f29611b5d3e626b2a2656cd7eb532c79c778ea2b3fec8", 0xd1}, {&(0x7f0000000300)="b36379ac310b", 0x6}, {&(0x7f0000000340)="fef6a83f85e126f4ce2738489f7e0b2ba8283cd6c4b02bcc48f8930a7dd174251d6038de8e69604ac23ec4caa85bf4e6b6844cdbb84d6a345efa03462039dfcc78cb20bbb2348208409fdc3014043a27e61b1e56ae2e3feee367b4ff4a1cf48e2c540d86c48ff4e8c2dc208c77ee052121da291a54941e6d35bf10493883395e8b9350faa1b92dd3b6fcfb7f156249afa1bc7695923977683fd4bf5f572ebd3e74f90869b5843fdfb381d3779e8d6040137f2c82055155a9d60b760b9befe224e158d41b3281a9a6b3ca63a72f1bd012c3320573ac32951b6abbc4ba", 0xdc}], 0x3}, 0x40000c0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r4, 0x400, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xa98}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 16:41:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x1f, 0x15, 0x0, 0xfffd, 0x0, 0xfffffffd, 0x0}) 16:41:26 executing program 0: syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1356.582891][ T9859] usb usb9: usbfs: process 9859 (syz-executor.2) did not claim interface 0 before use [ 1356.611075][ T9905] kAFS: No cell specified 16:41:26 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_POLL(r2, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x1f}}, 0x18) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:26 executing program 0: syslog(0x0, &(0x7f00000000c0)=""/187, 0xbb) 16:41:26 executing program 1: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3ff, 0xb6601) socket$alg(0x26, 0x5, 0x0) [ 1356.701598][T10031] vhci_hcd: invalid port number 253 [ 1356.718638][T10031] vhci_hcd: default hub control req: 1f15 v0000 i00fd l0 16:41:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x400000000075, 0x501041) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x5, 0x6, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000940}, 0x4881) 16:41:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:26 executing program 0: syslog(0x0, 0x0, 0x0) [ 1356.839938][T10158] usb usb9: usbfs: process 10158 (syz-executor.4) did not claim interface 0 before use [ 1356.858149][T10163] kAFS: No cell specified 16:41:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:26 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100010000000000"], 0x0) 16:41:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x8, 0x2a02c1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) pwrite64(r1, &(0x7f00000000c0)="31f832785b4b8af73b2d2eb7ee350a0c5a347355c947a1618ef19c348339bb57de10c4dfe4d41224e9fb361fe9b0f58a745e90c65848e3cccf3bf100d1f46bd56a4d972e79cc24b630dafd630caadf765359d1c100c95979b9b2caa33bd414314f3aa05922e84030c915afd8d1db7042f1808f8d8cccfdb2b2", 0x79, 0x1) 16:41:26 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x1f, 0x15, 0x0, 0xfffd, 0x0, 0xfffffffd, 0x0}) [ 1356.941137][T10167] usb usb9: usbfs: process 10167 (syz-executor.2) did not claim interface 0 before use 16:41:26 executing program 0: syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1357.020297][T10171] kAFS: No cell specified 16:41:26 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r2) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:26 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.102024][T10176] vhci_hcd: invalid port number 253 16:41:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0894bc0100000000000000c12c1bcebd52000000000010007ea789559503b49c2b872c86b820374294789676b6e1b74a523ef708bc2dd816b69a6735536a0421e62d9c51db7b594530fce16ea2a32374862d1b55be2359921ba3a44202994a164f43b8526626ad85aa3c6a4c07af1ad0a5492764d1a17f10042fb6d4d7fa8f7f88106c2c856a384dd510ec8b1c320e136df283dd9fdd2a606c9ed102a3bf6f8253386ae6420448f765f1a1ef8c5e144329591be16eb8453c084b14fc7719a762ca5d75f105a099d9f5a732e0a9fa390d"], 0x0) [ 1357.122410][T10176] vhci_hcd: default hub control req: 1f15 v0000 i00fd l0 [ 1357.159833][T10261] usb usb9: usbfs: process 10261 (syz-executor.2) did not claim interface 0 before use 16:41:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2$9p(&(0x7f0000000040), 0x4000) [ 1357.218376][T10290] kAFS: No cell specified 16:41:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba4350"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.317430][T10295] usb usb9: usbfs: process 10295 (syz-executor.5) did not claim interface 0 before use [ 1357.347682][T10294] kAFS: No cell specified 16:41:27 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x440) r2 = socket(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x601}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x2}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @random="4549114db831"}, @NL80211_ATTR_MAC={0xa, 0x6, @dev={[], 0x1c}}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x20044091) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r0, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r6 = accept$phonet_pipe(r5, &(0x7f0000000000), &(0x7f0000000040)=0x10) signalfd4(r6, &(0x7f0000000080)={[0x7]}, 0x8, 0x80000) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0)=0x63b, 0x4) r7 = socket$xdp(0x2c, 0x3, 0x0) open_by_handle_at(r7, &(0x7f00000001c0)={0xe3, 0x3d, "a89ceef122f7c9f00cb1270300c3887dd1dfb13aebdd31a723a112e7cc497406d08ecfe1c1c8bfc304c2cbe73fde474495ef7abfdd0000008eb32b5656f1f4a2757b68908bd2669433c1087b3c1009e116e29cffba7e1f90f55be8e3c3b67f31300d88434c0b4885789ee6c4010000004a98024ff738e32bd665adbcf9cdca7189faae007eb87500000058a675e2000000000000000000002d257457d1b8c487264d4e1b6447675b9a56a1355f4abfe1b9ac52958925545a2c16b7fc9d245259f7cbac22bd381007528524067949ee6ccd682b9e7e000000000000"}, 0x80e02) [ 1357.360265][T10295] usb usb9: usbfs: process 10295 (syz-executor.5) did not claim interface 0 before use [ 1357.394648][T10310] usb usb9: usbfs: process 10310 (syz-executor.2) did not claim interface 0 before use [ 1357.412804][T10301] kAFS: Bad value for 'source' 16:41:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.442583][T10363] kAFS: No cell specified [ 1357.443640][T10376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10376 comm=syz-executor.1 16:41:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0x9, 0x2, r2, 0x0, &(0x7f0000000040)={0x980924, 0x1000, [], @value64=0x3}}) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000100)={[{0xfffffff7, 0x9, 0x9, 0x0, 0x2, 0xe0, 0x8, 0x5, 0x6, 0x1e, 0x3, 0xfc, 0x73}, {0x4, 0x9, 0x12, 0x9, 0x9, 0x40, 0xf9, 0x6, 0x81, 0x3, 0x8, 0x9, 0x8001}, {0x5, 0x1000, 0x6, 0x0, 0x5, 0x8, 0x80, 0x6, 0x2, 0x7, 0x3e, 0x3, 0xfffffffffffffff7}], 0x8}) r4 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x0, 0x0, 0x3, 0x0}) 16:41:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.591315][T10503] kAFS: No cell specified 16:41:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0], 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={0x0, 0x9}, 0x8) [ 1357.611621][T10551] usb usb9: usbfs: process 10551 (syz-executor.2) did not claim interface 0 before use [ 1357.623325][T10552] kAFS: No cell specified 16:41:27 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.658687][T10554] kAFS: Bad value for 'source' 16:41:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x5781bbdda66656d1) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x3e) prctl$PR_GET_SECUREBITS(0x1b) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x60, 0x10, 0x5, 0x65, 0x0, 0x800100, 0x0}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) r2 = getpid() r3 = getpgid(0x0) r4 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) sendmsg$inet6(r4, &(0x7f0000000700)={&(0x7f0000000100)={0xa, 0x4e20, 0xfff, @local, 0x5}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000140)="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", 0xfd}, {&(0x7f0000000240)="e2c20a43a9f1ac37d9ddc16bd5912a2c267e373dfc46e2caf3a474282e4fd7132b7bc44b77af1faeaee8c4ddc9574d07322258bd930a8223ea748005668fc29d8467f8b226be6f9746ac210b92f320cdf16cb01436e8481c82440a3817455969ed0d3c1c384acdb730407ad19f1e7df484dc8d18d90507010d7004feace538d7c5cc1a91d7779e81deec4c93ac52f79d879d7850d07db8c24d805989a218e65798230d367ca17e2f21b461ed258fab5630e45af5295c8bcaf96b8eed065f74", 0xbf}, {&(0x7f0000000300)="e68a8f81bc390639d86d14bad0a9ebe0806e273b424f4a4b5bb56dbbd7f3eb249ad7bb54d730d4f55619075c420a3c8fb4fa5218e791412d74c18de790ed8a486c8aa4094bcc0e9dd867275bcfadc2b1ed005eed4831eb76fd5495eb316770bb939843864698f1afdf39b3b903a63edb3c76efa5c8f8d4f95d190d04afe67e2bcbb87ea6d509825c5fc33b035b665087e5207d185193d7f1a02144d5f0ee9e", 0x9f}, {&(0x7f00000003c0)="8b6d47e2e414fefb25e781a8c956218142e464dea8d157e5006e408227b3630e2e1f7e60f76571567bca9c2cef7afae947588e7a5ef35c07b09e09fa7ba7cec0f865b82a1b550a5cee013f94553ba356e2f9aed0ac55279922550ba21df85f388cfa856d675ae6a1e3dc8df52bde115b8cf81236422122e9", 0x78}, {&(0x7f0000000440)="53e0d42d1f5a8f301d65b1259ffd9b07eb842c8ea945ad48c9a3ea0692733caaa900fac2271c75b5e47440d10e9f1e1aa1db227dfc43479ab3f3c4a7816ab37af9f503d5cc28b87e3aa7e688dfa8cf987d2e1144e5e3c0189693088fe5d12ceb4c35562d1ec4d0bf9e30430febd71422d495c60ae4f5216d6ab1fa358db1d4c33d285bcb8e112a502b71985d75b26e01176dd508a0be6e373a87593c2c4afdfbad248ea29931629213c76daf203c4d7572a58070f619b14269d5786ad7e53d672193e72c21a7", 0xc6}], 0x5, &(0x7f00000005c0)=[@tclass={{0x14, 0x29, 0x43, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x8001}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x18, 0x0, [], [@pad1]}}}, @hopopts={{0x78, 0x29, 0x36, {0x2b, 0xb, [], [@hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x1b}}, @calipso={0x7, 0x38, {0x2, 0xc, 0x7f, 0x1f, [0x9, 0x8, 0x7fff, 0x8, 0x1000, 0x55]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xb6b}, @ra={0x5, 0x2, 0xfff}]}}}, @hopopts={{0x40, 0x29, 0x36, {0x3b, 0x5, [], [@calipso={0x7, 0x20, {0x0, 0x6, 0x40, 0x1, [0x8, 0xc4, 0x7]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x108}, 0x8010) kcmp$KCMP_EPOLL_TFD(r3, r2, 0x7, r1, &(0x7f00000000c0)={r4, r0, 0x4b}) 16:41:27 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1357.818120][T10638] usb usb9: usbfs: process 10638 (syz-executor.2) did not claim interface 0 before use [ 1357.837047][T10589] kAFS: No cell specified [ 1357.842482][T10665] kAFS: No cell specified [ 1357.862212][ T23] kauditd_printk_skb: 28 callbacks suppressed 16:41:27 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x1a, 0x8, "ff12c41c01ffb2e288cc830bd154e783830e"}, 0x400100) [ 1357.862229][ T23] audit: type=1400 audit(1579970487.734:2202): avc: denied { syslog } for pid=10577 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1357.885109][T10668] kAFS: Bad value for 'source' 16:41:27 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba43501228"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:27 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:27 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x18, 0xffff, 0x0, 0x0, 0xfffffffe, 0x0}) 16:41:27 executing program 4: mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.047099][T10834] kAFS: No cell specified [ 1358.052143][T10831] usb usb9: usbfs: process 10831 (syz-executor.2) did not claim interface 0 before use 16:41:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) clock_gettime(0x0, &(0x7f0000002cc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002a80)=[{{&(0x7f0000000100)=@alg, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)=""/208, 0xd0}], 0x1, &(0x7f0000000340)=""/112, 0x70}, 0x1f}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/93, 0x5d}, {&(0x7f00000004c0)=""/208, 0xd0}, {&(0x7f00000005c0)=""/37, 0x25}, {&(0x7f0000000600)=""/205, 0xcd}], 0x5, &(0x7f0000000780)=""/75, 0x4b}, 0x12}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/147, 0x93}], 0x1, &(0x7f0000000900)=""/57, 0x39}, 0x6}, {{&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000a80)=[{&(0x7f00000009c0)=""/184, 0xb8}], 0x1, &(0x7f0000000ac0)=""/181, 0xb5}, 0x8001}, {{&(0x7f0000000b80)=@nl=@unspec, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000002d40)=""/177, 0xb1}], 0x1}, 0x10}, {{&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000d80)=""/21, 0x15}, {&(0x7f0000000dc0)=""/214, 0xd6}, {&(0x7f0000000ec0)=""/53, 0x35}], 0x3}, 0x20000000}, {{&(0x7f0000000f40)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000fc0)=""/90, 0x5a}, {&(0x7f0000001040)=""/204, 0xcc}, {&(0x7f0000001140)=""/132, 0x84}, {&(0x7f0000001200)=""/42, 0x2a}, {&(0x7f0000001240)=""/197, 0xc5}, {&(0x7f0000001340)=""/15, 0xf}], 0x7, &(0x7f0000001400)=""/248, 0xf8}, 0xcf}, {{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000002600)=""/252, 0xfc}], 0x1, &(0x7f0000002700)=""/154, 0x9a}, 0x1}, {{&(0x7f0000001540)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002a40)=[{&(0x7f00000027c0)=""/41, 0x29}, {&(0x7f0000002800)=""/249, 0xf9}, {&(0x7f0000002900)=""/60, 0x3c}, {&(0x7f0000002940)=""/221, 0xdd}], 0x4}, 0x40}], 0x9, 0x41, &(0x7f0000002d00)={r2, r3+30000000}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r5, 0x112, 0xd, 0x0, &(0x7f00000001c0)) connect(r5, &(0x7f0000000c00)=@nfc_llcp={0x27, 0x0, 0x2, 0x4, 0x3a, 0x5, "f66d6ac7cfd168c19ee0400e8f3541c6164d83393e5fba211bc02b225a3b08af9afaaed7ed724150b5542777a6e2b3214da0b20a051761dd04ad7b93f8c41b", 0x21}, 0x80) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f00000000c0)={0x5, 0x100, 0x4, {0x4, 0x7fff, 0x5825, 0x4}}) r6 = fcntl$dupfd(r1, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$sock_rose_SIOCADDRT(r6, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x17f1, @bcast, @netrom={'nr', 0x0}, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1358.094434][T10887] usb usb9: usbfs: process 10887 (syz-executor.5) did not claim interface 0 before use [ 1358.104442][ T23] audit: type=1400 audit(1579970487.974:2203): avc: denied { syslog } for pid=10790 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x2, 0x0) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:28 executing program 4: mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x2980, 0x0) ioctl$SNDCTL_DSP_SETFMT(r1, 0xc0045005, &(0x7f0000000140)=0xa167) 16:41:28 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 4: mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.295961][T10920] usb usb9: usbfs: process 10920 (syz-executor.5) did not claim interface 0 before use 16:41:28 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.350942][T10952] usb usb9: usbfs: process 10952 (syz-executor.2) did not claim interface 0 before use [ 1358.401306][ T23] audit: type=1400 audit(1579970488.274:2204): avc: denied { syslog } for pid=10904 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x531000, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'veth0_to_team\x00', {0x2, 0x4e21, @remote}}) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0) sendto$inet(r1, &(0x7f0000000100)="950164a82253cf9bb64542a2aed8dbd47a2d7d15b46e4545782537bd538c22cc5fb1fbeeedc34c49906aeb9fceaefe19db9e0fadc1a174d55798ad3a76c2c0bedaf5083841173d865c5034121b2212acb288c281321bb7", 0x57, 0x40, &(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10) readahead(r0, 0x3002, 0x1) 16:41:28 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000040)={0x20, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0}) 16:41:28 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1358.640236][T11174] usb usb9: usbfs: process 11174 (syz-executor.2) did not claim interface 0 before use [ 1358.658605][ T23] audit: type=1400 audit(1579970488.524:2205): avc: denied { syslog } for pid=11168 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) getrlimit(0x0, &(0x7f0000000100)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x458700, 0x0) ioctl$TCSETX(r1, 0x5433, &(0x7f00000000c0)={0x1ff, 0x1, [0x11b3, 0x5, 0x5, 0x8, 0x3], 0x8}) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) socket$nl_crypto(0x10, 0x3, 0x15) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000400)="6e6aa61d8f987678891dda6913c30c93ee646864f53962cba9e0905bbf9ee4db7ed8f809c12d14f58ae9d8065506778fafdbf88cad82c8e161ff4c712756eaa706b64d0d906c85e3d0a2ba12672d6dcc15f0ddbc7299b1ca27bcfbfda49792d72148d6c7db23cb9c27eb3702c847ea45635c119b01d9838cc4cc75d80c3a80238d39887fe3e435b6c8ae85d74f7aa84b77c60511008ad907428e78e2d2786209848600a9acb8027bd0252b24e94e5dac31f7cf46f5549083e5c190465b05618185f9239249a74e28df95671a6f3f4af1b180a943254ab497e71a79d67abf528f1c4118aae4a7e464") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x0) move_pages(r2, 0x8, &(0x7f00000001c0)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil], &(0x7f0000000200)=[0x5, 0x9, 0x1, 0xffffff7f, 0x10001, 0xc8bf, 0x6d0, 0x3ff, 0x3], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x6) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000140)) connect$l2tp(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr=0x9fe, 0x2}, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_WRITE(r4, &(0x7f0000000340)={0x18, 0xffffffffffffffda, 0x8, {0x7}}, 0x18) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x20, 0x0) r6 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r6, 0x101, 0x3, 0xfffffffffffffffc) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "c55280a8eadb0737a703657fe4853fed30b0392269b38002df4444306a8744e86fbfd59015bcb6b7d07aefd90018304687fb0afd04175cbffedffc46ee5199c7", "602a95267fd2a488fe2aa8e8b4c5e26ef1ce8704e960c19416c198d344756c9bcbc23961697338c3b36058f722ff5367795ee604818fe04496590c35c8ae71e9", "5b059728def85a01256af697cc66b0ff98859ff357fe9358f88c7ad61b17e24f"}) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000002c0)={[], 0x400, 0x4, 0x4, 0x400, 0xef9, r2}) 16:41:28 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) 16:41:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:28 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 2: syslog(0x9, &(0x7f00000000c0)=""/187, 0xbb) [ 1358.777323][ T23] audit: type=1400 audit(1579970488.634:2206): avc: denied { syslog } for pid=11222 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1358.845918][T11258] usb usb9: usbfs: process 11258 (syz-executor.5) did not claim interface 0 before use [ 1358.851169][ T23] audit: type=1400 audit(1579970488.694:2207): avc: denied { create } for pid=11252 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=0 16:41:28 executing program 4: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[], 0x0) 16:41:28 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:28 executing program 2: syslog(0x0, &(0x7f00000000c0)=""/187, 0xbb) 16:41:28 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$SNDRV_PCM_IOCTL_HW_FREE(0xffffffffffffffff, 0x4112, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1358.977438][ T23] audit: type=1400 audit(1579970488.694:2208): avc: denied { open } for pid=11252 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=0 16:41:28 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 2: syslog(0x0, 0x0, 0x0) 16:41:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="08000000001b0000a2144b16b9945a841c3e9ee9e686154a94944062d5c0feb5680000000000000000825e33"], 0x0) [ 1359.082332][ T23] audit: type=1400 audit(1579970488.764:2209): avc: denied { syslog } for pid=11339 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.163596][T11360] usb usb9: usbfs: process 11360 (syz-executor.5) did not claim interface 0 before use [ 1359.177131][ T23] audit: type=1400 audit(1579970488.774:2210): avc: denied { map } for pid=11341 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 [ 1359.203926][T11363] kAFS: No cell specified 16:41:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.288179][ T23] audit: type=1400 audit(1579970488.924:2211): avc: denied { syslog } for pid=11349 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1359.324312][T11374] kAFS: No cell specified 16:41:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) r2 = dup3(r1, r1, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}], 0x20) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="0200b29d", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x6, 0x101, 0x80000000, 0x7fffffff, r6}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000140)={r7, 0xe67f, 0x3ff}, 0x8) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) r8 = socket$inet(0x2, 0x2, 0x0) bind$inet(r8, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r8, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r8, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) write$FUSE_NOTIFY_INVAL_ENTRY(r10, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) name_to_handle_at(r10, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={0x32, 0xa333, "7f509dd7a92d85a075dd731117537bf18d10b1980069e7c5e6800148f511c42ea3b8a336b75c18bc9622"}, &(0x7f0000000340), 0x1000) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r11 = socket$inet_tcp(0x2, 0x1, 0x0) r12 = fcntl$dupfd(r1, 0x0, r11) write$FUSE_NOTIFY_INVAL_ENTRY(r12, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000003000000000000000000000000000000000000000b000000100000004f504c656d303a62050bf452b1900bb46465760088e86c73da25164bf4a19d9ead9be3cbd2b53f9e0d3e74e12d6416d4355244e5859df4a0e5b6f98f66f4ee6a18f591fc0adf4bebb0b3be979b7df1509058643802a6ad9f368dcd9f00"/140], 0x2c) setsockopt$RDS_CANCEL_SENT_TO(r12, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) 16:41:29 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.395085][T11379] kAFS: No cell specified 16:41:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:29 executing program 3 (fault-call:0 fault-nth:0): syslog(0x0, 0x0, 0x0) [ 1359.553916][T11390] kAFS: No cell specified [ 1359.563567][T11391] kAFS: No cell specified 16:41:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.627954][T11394] FAULT_INJECTION: forcing a failure. [ 1359.627954][T11394] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.695091][T11394] CPU: 1 PID: 11394 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1359.703810][T11394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.706320][T11405] FAULT_INJECTION: forcing a failure. [ 1359.706320][T11405] name failslab, interval 1, probability 0, space 0, times 0 [ 1359.713880][T11394] Call Trace: [ 1359.713908][T11394] dump_stack+0x197/0x210 [ 1359.713931][T11394] should_fail.cold+0xa/0x15 [ 1359.713950][T11394] ? fault_create_debugfs_attr+0x180/0x180 [ 1359.713968][T11394] ? ___might_sleep+0x163/0x2c0 [ 1359.713991][T11394] __should_failslab+0x121/0x190 [ 1359.754306][T11394] should_failslab+0x9/0x14 [ 1359.758943][T11394] __kmalloc_track_caller+0x2dc/0x760 [ 1359.764347][T11394] ? fput+0x1b/0x20 [ 1359.768176][T11394] ? ksys_write+0x1cf/0x290 [ 1359.772695][T11394] ? strndup_user+0x77/0xd0 [ 1359.777225][T11394] memdup_user+0x26/0xd0 [ 1359.781486][T11394] strndup_user+0x77/0xd0 [ 1359.785833][T11394] __x64_sys_mount+0xe9/0x230 [ 1359.790512][T11394] do_syscall_64+0xfa/0x790 [ 1359.795022][T11394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.800912][T11394] RIP: 0033:0x45b349 [ 1359.804920][T11394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1359.824524][T11394] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1359.832967][T11394] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 16:41:29 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.840949][T11394] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1359.848929][T11394] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1359.856909][T11394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1359.864888][T11394] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 [ 1359.882482][T11405] CPU: 0 PID: 11405 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1359.891183][T11405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.901261][T11405] Call Trace: [ 1359.903835][T11545] kAFS: No cell specified [ 1359.904560][T11405] dump_stack+0x197/0x210 [ 1359.904588][T11405] should_fail.cold+0xa/0x15 [ 1359.904609][T11405] ? fault_create_debugfs_attr+0x180/0x180 [ 1359.923803][T11405] __should_failslab+0x121/0x190 [ 1359.928764][T11405] should_failslab+0x9/0x14 [ 1359.933280][T11405] kmem_cache_alloc+0x47/0x710 [ 1359.938225][T11405] audit_log_start+0x2dd/0x7c0 16:41:29 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1359.943069][T11405] ? audit_log_task_context+0x170/0x170 [ 1359.948636][T11405] ? find_held_lock+0x35/0x130 [ 1359.953415][T11405] ? __kasan_check_read+0x11/0x20 [ 1359.958446][T11405] ? mark_lock+0xc2/0x1220 [ 1359.962874][T11405] ? mntput_no_expire+0x162/0xbc0 [ 1359.967919][T11405] ? __kasan_check_read+0x11/0x20 [ 1359.972961][T11405] ? __lock_acquire+0x8a0/0x4a00 [ 1359.977916][T11405] ? avc_audit_pre_callback+0x270/0x270 [ 1359.983476][T11405] ? lsm_read+0x70/0x70 [ 1359.987646][T11405] common_lsm_audit+0xd3/0x1d70 16:41:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x4, 0x5, 0x4, 0x400000, 0x0, {}, {0x5, 0xc, 0x81, 0x21, 0x33, 0x3f, "8bad5a0f"}, 0x800, 0x1, @fd=r2, 0xffffffff, 0x0, 0xffffffffffffffff}) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x103, 0xcb, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4044012) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1359.992517][T11405] ? ipv6_skb_to_auditdata+0xdc0/0xdc0 [ 1359.998106][T11405] ? find_held_lock+0x35/0x130 [ 1360.002890][T11405] ? avc_has_perm_noaudit+0x38c/0x570 [ 1360.008298][T11405] ? lock_downgrade+0x920/0x920 [ 1360.013176][T11405] slow_avc_audit+0x1c4/0x260 [ 1360.017869][T11405] ? avc_get_hash_stats+0x2f0/0x2f0 [ 1360.023432][T11405] ? avc_has_perm_noaudit+0x3b3/0x570 [ 1360.028832][T11405] ? avc_has_extended_perms+0x10f0/0x10f0 [ 1360.034568][T11405] ? __kasan_check_read+0x11/0x20 [ 1360.038620][T11547] kAFS: Bad value for 'source' [ 1360.039754][T11405] ? __lock_acquire+0x8a0/0x4a00 [ 1360.039777][T11405] cred_has_capability+0x2be/0x330 [ 1360.039798][T11405] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1360.039815][T11405] ? __f_unlock_pos+0x19/0x20 [ 1360.039829][T11405] ? find_held_lock+0x35/0x130 [ 1360.039856][T11405] selinux_capable+0x36/0x40 [ 1360.039872][T11405] security_capable+0x7f/0xc0 [ 1360.039956][T11405] ns_capable_common+0x7d/0x100 [ 1360.039974][T11405] capable+0x1f/0x30 [ 1360.040041][T11405] check_syslog_permissions+0x7d/0x110 [ 1360.040056][T11405] do_syslog+0xa2/0x1870 [ 1360.040076][T11405] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1360.040091][T11405] ? fput_many+0x12c/0x1a0 [ 1360.040107][T11405] ? log_buf_vmcoreinfo_setup+0x140/0x140 [ 1360.040126][T11405] ? ksys_write+0x1cf/0x290 [ 1360.118849][T11405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1360.124327][T11405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1360.129803][T11405] ? do_syscall_64+0x26/0x790 [ 1360.134493][T11405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.140670][T11405] ? do_syscall_64+0x26/0x790 16:41:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.145368][T11405] __x64_sys_syslog+0x75/0xb0 [ 1360.150058][T11405] do_syscall_64+0xfa/0x790 [ 1360.154586][T11405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.160487][T11405] RIP: 0033:0x45b349 [ 1360.164392][T11405] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.184149][T11405] RSP: 002b:00007fc7fe7bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 16:41:30 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.192575][T11405] RAX: ffffffffffffffda RBX: 00007fc7fe7bf6d4 RCX: 000000000045b349 [ 1360.200573][T11405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1360.208558][T11405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1360.216638][T11405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1360.224622][T11405] R13: 0000000000000b4b R14: 00000000004c92d6 R15: 0000000000000000 16:41:30 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000000000bd"], 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x400, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x304}, "51cd8575de25ade4", "8f66fe3b79e1389886301933c866b584c45400771e43125c7fe381d2ab3927a3", "6f013904", "f0792246618043cb"}, 0x38) r3 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x9, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x3a0) recvfrom$inet(r3, &(0x7f00000001c0)=""/218, 0xda, 0x42, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) [ 1360.283195][T11663] kAFS: Bad value for 'source' 16:41:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1360.358159][T11667] FAULT_INJECTION: forcing a failure. [ 1360.358159][T11667] name failslab, interval 1, probability 0, space 0, times 0 16:41:30 executing program 3 (fault-call:0 fault-nth:1): syslog(0x0, 0x0, 0x0) [ 1360.409114][T11667] CPU: 0 PID: 11667 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1360.417843][T11667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.427926][T11667] Call Trace: [ 1360.431238][T11667] dump_stack+0x197/0x210 [ 1360.435591][T11667] should_fail.cold+0xa/0x15 [ 1360.440204][T11667] ? fault_create_debugfs_attr+0x180/0x180 [ 1360.446035][T11667] ? ___might_sleep+0x163/0x2c0 [ 1360.450908][T11667] __should_failslab+0x121/0x190 16:41:30 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000040)) [ 1360.455862][T11667] should_failslab+0x9/0x14 [ 1360.460388][T11667] __kmalloc_track_caller+0x2dc/0x760 [ 1360.465777][T11667] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1360.472045][T11667] ? strndup_user+0x77/0xd0 [ 1360.476650][T11667] memdup_user+0x26/0xd0 [ 1360.480906][T11667] strndup_user+0x77/0xd0 [ 1360.485383][T11667] __x64_sys_mount+0x132/0x230 [ 1360.490167][T11667] do_syscall_64+0xfa/0x790 [ 1360.494691][T11667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.500594][T11667] RIP: 0033:0x45b349 [ 1360.504500][T11667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.523721][T11671] kAFS: Bad value for 'source' [ 1360.524104][T11667] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1360.524121][T11667] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1360.524131][T11667] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 16:41:30 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1360.524140][T11667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1360.524148][T11667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1360.524163][T11667] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000001 [ 1360.560345][T11674] FAULT_INJECTION: forcing a failure. [ 1360.560345][T11674] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.635685][T11674] CPU: 1 PID: 11674 Comm: syz-executor.3 Not tainted 5.5.0-rc7-syzkaller #0 [ 1360.644418][T11674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.654490][T11674] Call Trace: [ 1360.657804][T11674] dump_stack+0x197/0x210 [ 1360.662155][T11674] should_fail.cold+0xa/0x15 [ 1360.666775][T11674] ? fault_create_debugfs_attr+0x180/0x180 [ 1360.672604][T11674] ? __lock_acquire+0x8a0/0x4a00 [ 1360.677657][T11674] __should_failslab+0x121/0x190 [ 1360.682618][T11674] should_failslab+0x9/0x14 [ 1360.687304][T11674] kmem_cache_alloc_node+0x56/0x740 [ 1360.692774][T11674] __alloc_skb+0xd5/0x5e0 [ 1360.697135][T11674] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1360.702806][T11674] ? kmem_cache_alloc+0x364/0x710 [ 1360.707859][T11674] audit_log_start+0x302/0x7c0 [ 1360.712650][T11674] ? audit_log_task_context+0x170/0x170 [ 1360.718207][T11674] ? find_held_lock+0x35/0x130 [ 1360.722985][T11674] ? __kasan_check_read+0x11/0x20 [ 1360.728183][T11674] ? mark_lock+0xc2/0x1220 [ 1360.732614][T11674] ? mntput_no_expire+0x162/0xbc0 [ 1360.737651][T11674] ? __kasan_check_read+0x11/0x20 [ 1360.742695][T11674] ? __lock_acquire+0x8a0/0x4a00 [ 1360.748605][T11674] ? avc_audit_pre_callback+0x270/0x270 [ 1360.754162][T11674] ? lsm_read+0x70/0x70 [ 1360.758338][T11674] common_lsm_audit+0xd3/0x1d70 [ 1360.763206][T11674] ? ipv6_skb_to_auditdata+0xdc0/0xdc0 [ 1360.768704][T11674] ? find_held_lock+0x35/0x130 [ 1360.773495][T11674] ? avc_has_perm_noaudit+0x38c/0x570 [ 1360.778891][T11674] ? lock_downgrade+0x920/0x920 [ 1360.783760][T11674] slow_avc_audit+0x1c4/0x260 [ 1360.788461][T11674] ? avc_get_hash_stats+0x2f0/0x2f0 [ 1360.793676][T11674] ? avc_has_perm_noaudit+0x3b3/0x570 [ 1360.799061][T11674] ? avc_has_extended_perms+0x10f0/0x10f0 [ 1360.804790][T11674] ? __kasan_check_read+0x11/0x20 [ 1360.809961][T11674] ? __lock_acquire+0x8a0/0x4a00 [ 1360.814913][T11674] cred_has_capability+0x2be/0x330 [ 1360.820151][T11674] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 1360.825789][T11674] ? __f_unlock_pos+0x19/0x20 [ 1360.830727][T11674] ? find_held_lock+0x35/0x130 [ 1360.835535][T11674] selinux_capable+0x36/0x40 [ 1360.840137][T11674] security_capable+0x7f/0xc0 [ 1360.845039][T11674] ns_capable_common+0x7d/0x100 [ 1360.849902][T11674] capable+0x1f/0x30 [ 1360.853812][T11674] check_syslog_permissions+0x7d/0x110 [ 1360.859278][T11674] do_syslog+0xa2/0x1870 [ 1360.863536][T11674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1360.869788][T11674] ? fput_many+0x12c/0x1a0 [ 1360.874218][T11674] ? log_buf_vmcoreinfo_setup+0x140/0x140 [ 1360.879942][T11674] ? ksys_write+0x1cf/0x290 [ 1360.884459][T11674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1360.889936][T11674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1360.895409][T11674] ? do_syscall_64+0x26/0x790 [ 1360.900092][T11674] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.906170][T11674] ? do_syscall_64+0x26/0x790 [ 1360.910872][T11674] __x64_sys_syslog+0x75/0xb0 [ 1360.915580][T11674] do_syscall_64+0xfa/0x790 [ 1360.920099][T11674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.925999][T11674] RIP: 0033:0x45b349 [ 1360.929909][T11674] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.949513][T11674] RSP: 002b:00007fc7fe7bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 1360.958026][T11674] RAX: ffffffffffffffda RBX: 00007fc7fe7bf6d4 RCX: 000000000045b349 [ 1360.966014][T11674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1360.974009][T11674] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1360.981993][T11674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1360.989971][T11674] R13: 0000000000000b4b R14: 00000000004c92d6 R15: 0000000000000001 16:41:30 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:31 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1361.115746][T11785] kAFS: Bad value for 'source' 16:41:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100010000000000"], 0x0) 16:41:31 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1361.275380][T11790] FAULT_INJECTION: forcing a failure. [ 1361.275380][T11790] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.328767][T11790] CPU: 1 PID: 11790 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1361.337602][T11790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.347667][T11790] Call Trace: [ 1361.351053][T11790] dump_stack+0x197/0x210 [ 1361.355431][T11790] should_fail.cold+0xa/0x15 [ 1361.360056][T11790] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.365880][T11790] ? ___might_sleep+0x163/0x2c0 [ 1361.370315][T11795] kAFS: Bad value for 'source' [ 1361.370745][T11790] __should_failslab+0x121/0x190 [ 1361.370763][T11790] should_failslab+0x9/0x14 [ 1361.370785][T11790] kmem_cache_alloc+0x2aa/0x710 [ 1361.390016][T11790] ? __might_fault+0x12b/0x1e0 [ 1361.394793][T11790] ? find_held_lock+0x35/0x130 [ 1361.399601][T11790] getname_flags+0xd6/0x5b0 [ 1361.404131][T11790] user_path_at_empty+0x2f/0x50 [ 1361.409002][T11790] do_mount+0x150/0x1b50 [ 1361.413266][T11790] ? copy_mount_string+0x40/0x40 [ 1361.418323][T11790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.424584][T11790] ? _copy_from_user+0x12c/0x1a0 [ 1361.429543][T11790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1361.435802][T11790] ? copy_mount_options+0x2e8/0x3f0 [ 1361.441018][T11790] __x64_sys_mount+0x192/0x230 [ 1361.445804][T11790] do_syscall_64+0xfa/0x790 [ 1361.450326][T11790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.456363][T11790] RIP: 0033:0x45b349 [ 1361.460283][T11790] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:41:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$rds(r2, &(0x7f0000001440)={&(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/133, 0x85}], 0x2, &(0x7f0000001380)=[@mask_cswp={0x58, 0x114, 0x9, {{0x4, 0xa}, &(0x7f00000011c0)=0x5, &(0x7f0000001200)=0x1, 0x9, 0x7ff, 0x9, 0x8a15, 0x51, 0x7200000}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001240)=""/194, 0xc2}, &(0x7f0000001340), 0x61}}], 0x88, 0x20000804}, 0xc800) [ 1361.479891][T11790] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1361.488300][T11790] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1361.496367][T11790] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1361.504582][T11790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1361.512562][T11790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1361.520604][T11790] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000002 16:41:31 executing program 4 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1361.638601][T11802] kAFS: Bad value for 'source' [ 1361.652235][T11804] FAULT_INJECTION: forcing a failure. [ 1361.652235][T11804] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.686324][T11804] CPU: 0 PID: 11804 Comm: syz-executor.4 Not tainted 5.5.0-rc7-syzkaller #0 [ 1361.695042][T11804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.705103][T11804] Call Trace: [ 1361.708426][T11804] dump_stack+0x197/0x210 [ 1361.712783][T11804] should_fail.cold+0xa/0x15 [ 1361.717393][T11804] ? fault_create_debugfs_attr+0x180/0x180 [ 1361.723219][T11804] ? ___might_sleep+0x163/0x2c0 [ 1361.728086][T11804] __should_failslab+0x121/0x190 [ 1361.733043][T11804] should_failslab+0x9/0x14 [ 1361.737565][T11804] __kmalloc_track_caller+0x2dc/0x760 [ 1361.743071][T11804] ? fput+0x1b/0x20 [ 1361.746888][T11804] ? ksys_write+0x1cf/0x290 [ 1361.751533][T11804] ? strndup_user+0x77/0xd0 [ 1361.756055][T11804] memdup_user+0x26/0xd0 [ 1361.760320][T11804] strndup_user+0x77/0xd0 [ 1361.764670][T11804] __x64_sys_mount+0xe9/0x230 [ 1361.769367][T11804] do_syscall_64+0xfa/0x790 [ 1361.773883][T11804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.779781][T11804] RIP: 0033:0x45b349 [ 1361.783699][T11804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.803312][T11804] RSP: 002b:00007f564556ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1361.811738][T11804] RAX: ffffffffffffffda RBX: 00007f564556b6d4 RCX: 000000000045b349 [ 1361.819721][T11804] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1361.827794][T11804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:41:31 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x1f, 0x0, 0x4, 0x4, 0x3a4, {}, {0x5, 0xc, 0x81, 0x0, 0x5, 0x8, "6afebb1f"}, 0x7d9, 0x4, @userptr=0x5, 0x3f, 0x0, 0xffffffffffffffff}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_GETFMTS(r1, 0x8004500b, &(0x7f0000000100)=0x7ff) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0800001900000000"], 0x400000) prctl$PR_SET_DUMPABLE(0x4, 0x1) [ 1361.835773][T11804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1361.843755][T11804] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000000 16:41:31 executing program 3: syslog(0x0, 0x0, 0x0) 16:41:31 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1361.996999][T11942] kAFS: No cell specified 16:41:32 executing program 3: syslog(0x2, 0x0, 0x0) 16:41:32 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x400002) ioctl$TIOCSSERIAL(r0, 0x541e, &(0x7f0000000040)={0x400, 0xfffffffe, 0xffff, 0x5b, 0x8, 0x9d, 0x80000001, 0x3, 0x2, 0x0, 0x4, 0x2, 0xb4c, 0x9a90, &(0x7f00000001c0)=""/131, 0x8, 0x6f, 0x3}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000000000009aae790853e7913fec0196c1a822060000000000000010c50182aebf672bef6785231ef605e78a63bb5442a0be3e483ab96d84ebef9f95c4fda61241ed8128db616c23ea28b90ae1fc1eacd715f56ce097eebe2a8d26801a0d92a555af7d263096aa44cf3ad84a2b5db4ff819799b4796b26ec14f37d70b7ac4cef1218fc83ee107166cc3e671230c12f0f"], 0x0) 16:41:32 executing program 2 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.206796][T12025] kAFS: unparsable volume name 16:41:32 executing program 4 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.233734][T12064] FAULT_INJECTION: forcing a failure. [ 1362.233734][T12064] name failslab, interval 1, probability 0, space 0, times 0 16:41:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:32 executing program 3: syslog(0x3, 0x0, 0x0) [ 1362.313363][T12064] CPU: 0 PID: 12064 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1362.322262][T12064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.332331][T12064] Call Trace: [ 1362.335653][T12064] dump_stack+0x197/0x210 [ 1362.340007][T12064] should_fail.cold+0xa/0x15 [ 1362.344624][T12064] ? fault_create_debugfs_attr+0x180/0x180 [ 1362.350450][T12064] ? ___might_sleep+0x163/0x2c0 [ 1362.355319][T12064] __should_failslab+0x121/0x190 [ 1362.360271][T12064] should_failslab+0x9/0x14 [ 1362.364990][T12064] __kmalloc+0x2e0/0x770 [ 1362.369336][T12064] ? __kasan_check_read+0x11/0x20 [ 1362.374515][T12064] ? mark_lock+0xc2/0x1220 [ 1362.378943][T12064] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1362.384332][T12064] tomoyo_encode2.part.0+0xf5/0x400 [ 1362.389548][T12064] ? __kasan_check_read+0x11/0x20 [ 1362.394606][T12064] tomoyo_encode+0x2b/0x50 [ 1362.399036][T12064] tomoyo_mount_acl+0xe0/0x840 [ 1362.403825][T12064] ? avc_has_perm+0x376/0x610 [ 1362.408516][T12064] ? __kasan_check_read+0x11/0x20 [ 1362.413553][T12064] ? mark_lock+0xc2/0x1220 [ 1362.417980][T12064] ? avc_has_perm+0x376/0x610 [ 1362.422675][T12064] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1362.428246][T12064] ? __kasan_check_read+0x11/0x20 [ 1362.433294][T12064] ? __lock_acquire+0x8a0/0x4a00 [ 1362.438239][T12064] ? lock_downgrade+0x920/0x920 [ 1362.443136][T12064] ? lock_acquire+0x190/0x410 [ 1362.447827][T12064] ? tomoyo_mount_permission+0x10a/0x400 [ 1362.453575][T12064] tomoyo_mount_permission+0x16a/0x400 [ 1362.459077][T12064] ? tomoyo_mount_permission+0x10a/0x400 [ 1362.464727][T12064] ? tomoyo_mount_acl+0x840/0x840 [ 1362.469774][T12064] ? inode_has_perm+0x1b0/0x230 [ 1362.474645][T12064] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1362.481530][T12064] ? strncpy_from_user+0x2d1/0x410 [ 1362.486565][T12237] kAFS: unparsable volume name [ 1362.486662][T12064] tomoyo_sb_mount+0x35/0x40 [ 1362.496012][T12064] security_sb_mount+0x87/0xd0 [ 1362.500797][T12064] do_mount+0x1d4/0x1b50 [ 1362.505066][T12064] ? copy_mount_string+0x40/0x40 16:41:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.510023][T12064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.516278][T12064] ? _copy_from_user+0x12c/0x1a0 [ 1362.521226][T12064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1362.527914][T12064] ? copy_mount_options+0x2e8/0x3f0 [ 1362.536918][T12064] __x64_sys_mount+0x192/0x230 [ 1362.541706][T12064] do_syscall_64+0xfa/0x790 [ 1362.546227][T12064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.552129][T12064] RIP: 0033:0x45b349 [ 1362.556036][T12064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1362.575735][T12064] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1362.584168][T12064] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1362.592187][T12064] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1362.600179][T12064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:41:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1362.608167][T12064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1362.616154][T12064] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000003 16:41:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4401, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xd, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000080)={0x3, 'ip6tnl0\x00', {0x1}, 0x7f}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1362.662931][T12239] kAFS: Bad value for 'source' 16:41:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2, 0x0) 16:41:32 executing program 3: syslog(0x4, 0x0, 0x0) [ 1362.733429][T12243] kAFS: unparsable volume name 16:41:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d7577"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:32 executing program 3: syslog(0x9, 0x0, 0x0) [ 1362.878933][T12353] kAFS: Bad value for 'source' [ 1362.936281][T12356] kAFS: No cell specified [ 1362.951912][ T23] kauditd_printk_skb: 16 callbacks suppressed [ 1362.951926][ T23] audit: type=1400 audit(1579970492.824:2224): avc: denied { syslog } for pid=12355 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:32 executing program 2 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000040)={0xfff, 0x1ff}) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:32 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) getdents64(r3, 0x0, 0x600) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000002ac0)={0x4, 0x0, 0x510, r2, 0x0, &(0x7f0000002a80)={0x9b0906, 0xfffffffd, [], @string=&(0x7f0000002a40)=0x1f}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/sockstat6\x00') r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000300)='NLBL_CALIPSO\x00') r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB='\x00'/13, @ANYRES16=r7, @ANYBLOB="000127bd7000fcdbdf2507000000280003000800050000010001060004000700000014000200767863616e31000000000000000000000800040094000000"], 0x44}, 0x1, 0x0, 0x0, 0x4004010}, 0x40) sendmsg$NLBL_CALIPSO_C_ADD(r5, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0xe4acc4548bf3a791}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="bad7d488dd6f372847b10bd7c251d69904285b570f105bcae36136707ff1dbbb0dcb0a119d78bd4724f7b1e7e6b960d2c28eacb28ccac1f2482f8921939dee9df598adde68b9d2d51565e58c7f514458d272ab1ea2a3bd20a555207480ec9d489cecd9cce2463e674b74dff2b7455884f9a94a2662a6196a6eea10e6cd8c6ff380231c6cdc24f1b6b10e530305395652dcf17ae22149db0e77d697b7be4d1675529accb1cda95664e57ee864bd94f714aa44cfff2fecb3938993065a", @ANYRES16=r6, @ANYBLOB="00012bbd7000fedbdf250100000008000200020000000800020002000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000820}, 0x20090) sendmsg$NLBL_CALIPSO_C_REMOVE(r4, &(0x7f0000002bc0)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x9080800}, 0xc, &(0x7f0000002b80)={&(0x7f0000002b40)={0x2c, r6, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2a9faaebf446384f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008001}, 0x80) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r6, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x41) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0x1f, 0x3, 0x0, 0x4, 0x0, 0x800, 0x0}) 16:41:32 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x3, 0x0) 16:41:32 executing program 3: syslog(0x9, 0x0, 0x0) 16:41:32 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1363.005791][ T23] audit: type=1400 audit(1579970492.824:2225): avc: denied { syslog } for pid=12355 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1363.120125][ T23] audit: type=1400 audit(1579970492.994:2226): avc: denied { syslog } for pid=12361 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1363.123870][T12384] kAFS: Bad value for 'source' [ 1363.161934][T12425] FAULT_INJECTION: forcing a failure. 16:41:33 executing program 3: syslog(0x9, 0x0, 0x0) [ 1363.161934][T12425] name failslab, interval 1, probability 0, space 0, times 0 16:41:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x420841, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) [ 1363.208235][T12472] kAFS: unparsable volume name [ 1363.215287][ T23] audit: type=1400 audit(1579970492.994:2227): avc: denied { syslog } for pid=12361 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:33 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x83, 0x4, 0x6a, "823bcf11ed8ac91fcded89b25cf19926", "b128952f51e16e6942a1f130f0dfb9c4ac5d255d84f69bbcfab25800386274ce3768e3fd1c54553575bfbd8760e83ec0ba082fe0cd40d30c6d97a729f42b4b8e51d65f4b9551afca036349a7150b092fe6cc343e7cbab03330483a7d1729161be22cce6a0a2601a91e7a8edf75b4"}, 0x83, 0x0) 16:41:33 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4, 0x0) 16:41:33 executing program 3: syslog(0x9, 0x0, 0x0) 16:41:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1363.305233][ T23] audit: type=1400 audit(1579970493.044:2228): avc: denied { create } for pid=12360 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1363.375522][ T23] audit: type=1400 audit(1579970493.074:2229): avc: denied { create } for pid=12360 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1363.381497][T12479] usb usb9: usbfs: process 12479 (syz-executor.5) did not claim interface 0 before use [ 1363.420276][T12480] kAFS: Bad value for 'source' [ 1363.459342][ T23] audit: type=1400 audit(1579970493.074:2230): avc: denied { create } for pid=12360 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=0 [ 1363.472635][T12484] kAFS: unparsable volume name [ 1363.515260][ T23] audit: type=1400 audit(1579970493.134:2231): avc: denied { syslog } for pid=12473 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1363.528821][T12425] CPU: 1 PID: 12425 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1363.541030][ T23] audit: type=1400 audit(1579970493.144:2232): avc: denied { syslog } for pid=12473 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1363.549260][T12425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.549267][T12425] Call Trace: [ 1363.549293][T12425] dump_stack+0x197/0x210 [ 1363.549317][T12425] should_fail.cold+0xa/0x15 [ 1363.549336][T12425] ? fault_create_debugfs_attr+0x180/0x180 [ 1363.549389][T12425] ? ___might_sleep+0x163/0x2c0 [ 1363.549415][T12425] __should_failslab+0x121/0x190 [ 1363.575061][ T23] audit: type=1400 audit(1579970493.304:2233): avc: denied { syslog } for pid=12481 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1363.584737][T12425] should_failslab+0x9/0x14 [ 1363.584755][T12425] __kmalloc+0x2e0/0x770 [ 1363.584773][T12425] ? __kasan_check_read+0x11/0x20 [ 1363.584786][T12425] ? mark_lock+0xc2/0x1220 [ 1363.584803][T12425] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1363.584820][T12425] tomoyo_encode2.part.0+0xf5/0x400 [ 1363.584839][T12425] ? __kasan_check_read+0x11/0x20 [ 1363.672613][T12425] tomoyo_encode+0x2b/0x50 [ 1363.677035][T12425] tomoyo_mount_acl+0xe0/0x840 [ 1363.681803][T12425] ? avc_has_perm+0x376/0x610 [ 1363.686467][T12425] ? __kasan_check_read+0x11/0x20 [ 1363.691544][T12425] ? mark_lock+0xc2/0x1220 [ 1363.695961][T12425] ? avc_has_perm+0x376/0x610 [ 1363.700629][T12425] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1363.706203][T12425] ? __kasan_check_read+0x11/0x20 [ 1363.711229][T12425] ? __lock_acquire+0x8a0/0x4a00 [ 1363.716165][T12425] ? lock_downgrade+0x920/0x920 [ 1363.721018][T12425] ? lock_acquire+0x190/0x410 [ 1363.725691][T12425] ? tomoyo_mount_permission+0x10a/0x400 [ 1363.731328][T12425] tomoyo_mount_permission+0x16a/0x400 [ 1363.736771][T12425] ? tomoyo_mount_permission+0x10a/0x400 [ 1363.742396][T12425] ? tomoyo_mount_acl+0x840/0x840 [ 1363.747414][T12425] ? inode_has_perm+0x1b0/0x230 [ 1363.752301][T12425] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1363.757806][T12425] ? strncpy_from_user+0x2d1/0x410 [ 1363.762922][T12425] tomoyo_sb_mount+0x35/0x40 [ 1363.767495][T12425] security_sb_mount+0x87/0xd0 [ 1363.772259][T12425] do_mount+0x1d4/0x1b50 [ 1363.776559][T12425] ? copy_mount_string+0x40/0x40 [ 1363.781506][T12425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.787734][T12425] ? _copy_from_user+0x12c/0x1a0 [ 1363.792671][T12425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1363.799009][T12425] ? copy_mount_options+0x2e8/0x3f0 [ 1363.804252][T12425] __x64_sys_mount+0x192/0x230 [ 1363.809020][T12425] do_syscall_64+0xfa/0x790 [ 1363.813618][T12425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.819504][T12425] RIP: 0033:0x45b349 [ 1363.823387][T12425] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.843096][T12425] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1363.851511][T12425] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 16:41:33 executing program 2 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000080)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') 16:41:33 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x5, 0x0) 16:41:33 executing program 3: syslog(0x9, 0x0, 0x0) 16:41:33 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1363.859481][T12425] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1363.867452][T12425] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1363.875461][T12425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1363.883421][T12425] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000004 16:41:33 executing program 3: syslog(0xa, 0x0, 0x0) [ 1364.017345][T12593] kAFS: unparsable volume name [ 1364.038144][T12594] kAFS: Bad value for 'source' 16:41:33 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe66"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:34 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6, 0x0) [ 1364.114071][T12787] FAULT_INJECTION: forcing a failure. [ 1364.114071][T12787] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.206972][T12787] CPU: 0 PID: 12787 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1364.215690][T12787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.225936][T12787] Call Trace: [ 1364.229237][T12787] dump_stack+0x197/0x210 [ 1364.233694][T12787] should_fail.cold+0xa/0x15 [ 1364.238283][T12787] ? fault_create_debugfs_attr+0x180/0x180 [ 1364.244136][T12787] ? ___might_sleep+0x163/0x2c0 [ 1364.248998][T12787] __should_failslab+0x121/0x190 [ 1364.253966][T12787] should_failslab+0x9/0x14 [ 1364.258465][T12787] __kmalloc+0x2e0/0x770 [ 1364.262730][T12787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.268995][T12787] ? d_absolute_path+0x11b/0x170 [ 1364.273943][T12787] ? __d_path+0x140/0x140 [ 1364.278314][T12787] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1364.283702][T12787] tomoyo_encode2.part.0+0xf5/0x400 [ 1364.288944][T12787] tomoyo_encode+0x2b/0x50 [ 1364.293371][T12787] tomoyo_realpath_from_path+0x19c/0x660 [ 1364.299012][T12787] tomoyo_mount_acl+0x149/0x840 [ 1364.303865][T12787] ? avc_has_perm+0x376/0x610 [ 1364.308549][T12787] ? __kasan_check_read+0x11/0x20 [ 1364.313602][T12787] ? mark_lock+0xc2/0x1220 [ 1364.318006][T12787] ? avc_has_perm+0x376/0x610 [ 1364.322829][T12787] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1364.328399][T12787] ? __kasan_check_read+0x11/0x20 [ 1364.333437][T12787] ? lock_acquire+0x190/0x410 [ 1364.338285][T12787] ? tomoyo_mount_permission+0x10a/0x400 [ 1364.343947][T12787] tomoyo_mount_permission+0x16a/0x400 [ 1364.349407][T12787] ? tomoyo_mount_permission+0x10a/0x400 [ 1364.355044][T12787] ? tomoyo_mount_acl+0x840/0x840 [ 1364.360083][T12787] ? inode_has_perm+0x1b0/0x230 [ 1364.364947][T12787] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1364.370444][T12787] ? strncpy_from_user+0x2d1/0x410 [ 1364.375581][T12787] tomoyo_sb_mount+0x35/0x40 [ 1364.380175][T12787] security_sb_mount+0x87/0xd0 [ 1364.384936][T12787] do_mount+0x1d4/0x1b50 [ 1364.389316][T12787] ? copy_mount_string+0x40/0x40 [ 1364.394276][T12787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.400521][T12787] ? _copy_from_user+0x12c/0x1a0 [ 1364.405453][T12787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1364.411771][T12787] ? copy_mount_options+0x2e8/0x3f0 [ 1364.417006][T12787] __x64_sys_mount+0x192/0x230 [ 1364.421781][T12787] do_syscall_64+0xfa/0x790 [ 1364.426478][T12787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.432371][T12787] RIP: 0033:0x45b349 [ 1364.436261][T12787] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:41:34 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0xfffffffffffffc69, 0x0, 0xfffffffffffffd89}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)="0500000023002c0000068900ac14140de00000013c31b47d0510c147885b6e765e30637ec921f605", 0x5c4}], 0x1, 0x0, 0x0, 0x50}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r6, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f00000075c0)={0x1c, r7, 0xb631c6b8429a7eb, 0x0, 0x0, {0xc}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r9}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r7, 0x100, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x763}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7fd}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x94}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8}, 0x0) 16:41:34 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x7, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1364.455972][T12787] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1364.464394][T12787] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1364.472385][T12787] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1364.480437][T12787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1364.488615][T12787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1364.496594][T12787] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000005 16:41:34 executing program 3: syslog(0x48, 0x0, 0x0) [ 1364.585542][T12808] kAFS: No cell specified [ 1364.612656][T12811] kAFS: Bad value for 'source' 16:41:34 executing program 2 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:34 executing program 3: syslog(0x4c, 0x0, 0x0) 16:41:34 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7, 0x0) [ 1364.648322][T12814] usb usb9: usbfs: process 12814 (syz-executor.5) did not claim interface 0 before use [ 1364.668861][T12787] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1364.771038][T12887] kAFS: unparsable volume name [ 1364.797704][T12978] kAFS: Bad value for 'source' 16:41:34 executing program 3: syslog(0x68, 0x0, 0x0) 16:41:34 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) 16:41:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000040)={0xff, 0x3}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000000)={0x8, 0x1}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) userfaultfd(0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000080)={0x0, 0x458, 0x1, 0x7, 0x101}) [ 1364.818912][T13015] FAULT_INJECTION: forcing a failure. [ 1364.818912][T13015] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.884720][T13015] CPU: 1 PID: 13015 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1364.893446][T13015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.903523][T13015] Call Trace: [ 1364.906839][T13015] dump_stack+0x197/0x210 [ 1364.911212][T13015] should_fail.cold+0xa/0x15 [ 1364.915851][T13015] ? fault_create_debugfs_attr+0x180/0x180 [ 1364.921810][T13015] ? ___might_sleep+0x163/0x2c0 [ 1364.926687][T13015] __should_failslab+0x121/0x190 [ 1364.931772][T13015] should_failslab+0x9/0x14 [ 1364.936466][T13015] __kmalloc+0x2e0/0x770 [ 1364.940735][T13015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1364.947226][T13015] ? d_absolute_path+0x11b/0x170 [ 1364.952395][T13015] ? __d_path+0x140/0x140 [ 1364.956750][T13015] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1364.962835][T13015] tomoyo_encode2.part.0+0xf5/0x400 [ 1364.968078][T13015] tomoyo_encode+0x2b/0x50 [ 1364.972536][T13015] tomoyo_realpath_from_path+0x19c/0x660 [ 1364.978198][T13015] tomoyo_mount_acl+0x149/0x840 [ 1364.983066][T13015] ? avc_has_perm+0x376/0x610 [ 1364.988196][T13015] ? __kasan_check_read+0x11/0x20 [ 1364.993253][T13015] ? mark_lock+0xc2/0x1220 [ 1364.997888][T13015] ? avc_has_perm+0x376/0x610 [ 1365.002589][T13015] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1365.008152][T13015] ? __kasan_check_read+0x11/0x20 [ 1365.013218][T13015] ? lock_acquire+0x190/0x410 [ 1365.018063][T13015] ? tomoyo_mount_permission+0x10a/0x400 [ 1365.023724][T13015] tomoyo_mount_permission+0x16a/0x400 [ 1365.029212][T13015] ? tomoyo_mount_permission+0x10a/0x400 [ 1365.034863][T13015] ? tomoyo_mount_acl+0x840/0x840 [ 1365.039906][T13015] ? inode_has_perm+0x1b0/0x230 [ 1365.044777][T13015] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1365.050250][T13015] ? strncpy_from_user+0x2d1/0x410 [ 1365.053688][T13133] kAFS: unparsable volume name [ 1365.055377][T13015] tomoyo_sb_mount+0x35/0x40 [ 1365.055400][T13015] security_sb_mount+0x87/0xd0 [ 1365.055424][T13015] do_mount+0x1d4/0x1b50 [ 1365.055451][T13015] ? copy_mount_string+0x40/0x40 [ 1365.079434][T13015] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.086096][T13015] ? _copy_from_user+0x12c/0x1a0 [ 1365.091145][T13015] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.097440][T13015] ? copy_mount_options+0x2e8/0x3f0 [ 1365.103445][T13015] __x64_sys_mount+0x192/0x230 [ 1365.108241][T13015] do_syscall_64+0xfa/0x790 [ 1365.112770][T13015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.118832][T13015] RIP: 0033:0x45b349 [ 1365.122739][T13015] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.143189][T13015] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1365.151661][T13015] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1365.159763][T13015] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1365.167904][T13015] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1365.177314][T13015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 16:41:34 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:34 executing program 3: syslog(0x6c, 0x0, 0x0) 16:41:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=ANY=[], 0x40000) 16:41:34 executing program 3: syslog(0x74, 0x0, 0x0) 16:41:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1365.185722][T13015] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000006 [ 1365.217918][T13015] ERROR: Out of memory at tomoyo_realpath_from_path. 16:41:35 executing program 2 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x8, 0x0) 16:41:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="04080000c4ee1fb1dea19ee0e26df1628e2b0f4600000000"], 0x0) 16:41:35 executing program 3: syslog(0x7a, 0x0, 0x0) 16:41:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {r2, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1365.351058][T13146] kAFS: Bad value for 'source' [ 1365.362552][T13148] kAFS: unparsable volume name 16:41:35 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x40100) 16:41:35 executing program 3: syslog(0x17f, 0x0, 0x0) 16:41:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x10, 0x0) [ 1365.403750][T13150] FAULT_INJECTION: forcing a failure. [ 1365.403750][T13150] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.445230][T13150] CPU: 0 PID: 13150 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1365.454251][T13150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.464323][T13150] Call Trace: [ 1365.467899][T13150] dump_stack+0x197/0x210 [ 1365.470727][T13152] usb usb9: usbfs: process 13152 (syz-executor.5) did not claim interface 0 before use [ 1365.472253][T13150] should_fail.cold+0xa/0x15 [ 1365.472273][T13150] ? fault_create_debugfs_attr+0x180/0x180 [ 1365.472302][T13150] ? ___might_sleep+0x163/0x2c0 [ 1365.498018][T13150] __should_failslab+0x121/0x190 [ 1365.502985][T13150] should_failslab+0x9/0x14 [ 1365.507702][T13150] __kmalloc+0x2e0/0x770 [ 1365.511967][T13150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1365.518454][T13150] ? d_absolute_path+0x11b/0x170 [ 1365.523424][T13150] ? __d_path+0x140/0x140 [ 1365.527767][T13150] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1365.533164][T13150] tomoyo_encode2.part.0+0xf5/0x400 [ 1365.538403][T13150] tomoyo_encode+0x2b/0x50 [ 1365.542973][T13150] tomoyo_realpath_from_path+0x19c/0x660 [ 1365.548752][T13150] tomoyo_mount_acl+0x149/0x840 [ 1365.553756][T13150] ? avc_has_perm+0x376/0x610 [ 1365.558545][T13150] ? __kasan_check_read+0x11/0x20 [ 1365.563585][T13150] ? mark_lock+0xc2/0x1220 [ 1365.568164][T13150] ? avc_has_perm+0x376/0x610 [ 1365.572886][T13150] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 1365.578451][T13150] ? __kasan_check_read+0x11/0x20 [ 1365.583519][T13150] ? lock_acquire+0x190/0x410 [ 1365.588232][T13150] ? tomoyo_mount_permission+0x10a/0x400 [ 1365.593983][T13150] tomoyo_mount_permission+0x16a/0x400 [ 1365.599678][T13150] ? tomoyo_mount_permission+0x10a/0x400 [ 1365.605435][T13150] ? tomoyo_mount_acl+0x840/0x840 [ 1365.610483][T13150] ? inode_has_perm+0x1b0/0x230 [ 1365.615357][T13150] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1365.620851][T13150] ? strncpy_from_user+0x2d1/0x410 [ 1365.625982][T13150] tomoyo_sb_mount+0x35/0x40 [ 1365.630613][T13150] security_sb_mount+0x87/0xd0 [ 1365.635494][T13150] do_mount+0x1d4/0x1b50 [ 1365.639779][T13150] ? copy_mount_string+0x40/0x40 [ 1365.644734][T13150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.650059][T13314] kAFS: Bad value for 'source' [ 1365.650982][T13150] ? _copy_from_user+0x12c/0x1a0 [ 1365.651005][T13150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1365.651021][T13150] ? copy_mount_options+0x2e8/0x3f0 [ 1365.651045][T13150] __x64_sys_mount+0x192/0x230 [ 1365.676933][T13150] do_syscall_64+0xfa/0x790 [ 1365.682674][T13150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.688707][T13150] RIP: 0033:0x45b349 [ 1365.692672][T13150] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.712590][T13150] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1365.721021][T13150] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1365.729014][T13150] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1365.737103][T13150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:41:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x0) 16:41:35 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x77, 0x4001) 16:41:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x48, 0x0) [ 1365.745171][T13150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1365.753266][T13150] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000007 [ 1365.802464][T13364] kAFS: No cell specified [ 1365.809351][T13150] ERROR: Out of memory at tomoyo_realpath_from_path. 16:41:35 executing program 2 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:35 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000380)={0x0, 0xff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000003, 0x0, 0xc8f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(r1, 0x1, &(0x7f0000000040)={0x80000000, 0x400}, &(0x7f00000000c0)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:35 executing program 3: syslog(0x300, 0x0, 0x0) 16:41:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)={0xac, 0x0, "6f5aebd8125142eb45cbf855d0f6106e20d06609cd707e2dac7b267bbd925fd67615f3277997046a05130e5fc70a98b444af0e0e8fd248bc5ae1344933e9b063c168a5bd1a58a2690e585f0a4ba160547cf1e61bb514a2ff6959d781ca27e2f4cf2faded072617ea84121551fedcf964794a1e2c7bf5391d5eab49ffd1a3e5d7b787fdb6a0ff81feff78282ef2e4b86c11f9cb407038afaf914aa19eddedbd70b2477978"}, 0x0) [ 1365.909762][T13369] kAFS: Bad value for 'source' 16:41:35 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c, 0x0) 16:41:35 executing program 3: syslog(0x480, 0x0, 0x0) 16:41:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x408400, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_RESET(r0, 0x5000, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000080)="2df7206f5377e7539f87ddccf7625d639d937d4fb17b45bbbe1ae5014926d6eeb7f65af4bccd6c9eb25f912bebb8e59c8db997c7ea11d10ed9d99605c3861b7b40e067d9ed96a5b4b7debb6ed9798ae2df12b1ce7df9d2277eae1a0a41de7131fbfd319edb067314a1541ef8784e693adad71af96695b641a21007fe1f5e4e54f24d1d2049378bc0ce32a5f332bd6adca6b927623dc56be99d7c76777c837ce6ecdcea1cd4e15d8575dfa2831dcad42dfe935da29527b70dc26e10ef3b8a3197252fc49bedb8323c9c5623402d7dc1eb8f96237de6751092aaeec99c1dc172c5eb0a7cb1692da3df8dd4fba9d66cee9f17e826e41217e4227bdde75de0a1528a") open_by_handle_at(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="5e01000000000000"], 0x0) 16:41:35 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.006800][T13377] kAFS: No cell specified [ 1366.015126][T13378] usb usb9: usbfs: process 13378 (syz-executor.5) did not claim interface 0 before use [ 1366.027775][T13379] FAULT_INJECTION: forcing a failure. [ 1366.027775][T13379] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.081866][T13379] CPU: 0 PID: 13379 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1366.090681][T13379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.100750][T13379] Call Trace: [ 1366.104090][T13379] dump_stack+0x197/0x210 [ 1366.108447][T13379] should_fail.cold+0xa/0x15 [ 1366.113072][T13379] ? fault_create_debugfs_attr+0x180/0x180 [ 1366.118902][T13379] ? ___might_sleep+0x163/0x2c0 [ 1366.123793][T13379] __should_failslab+0x121/0x190 [ 1366.128757][T13379] should_failslab+0x9/0x14 [ 1366.133813][T13379] __kmalloc+0x2e0/0x770 [ 1366.138818][T13379] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1366.144212][T13379] tomoyo_encode2.part.0+0xf5/0x400 [ 1366.149577][T13379] ? __get_fs_type+0x9a/0xd0 [ 1366.154290][T13379] tomoyo_encode+0x2b/0x50 [ 1366.158853][T13379] tomoyo_mount_acl+0x320/0x840 [ 1366.163728][T13379] ? avc_has_perm+0x376/0x610 [ 1366.168441][T13379] ? mark_lock+0xc2/0x1220 [ 1366.172870][T13379] ? tomoyo_check_mount_acl+0x1b0/0x1b0 16:41:36 executing program 3: syslog(0x500, 0x0, 0x0) [ 1366.178655][T13379] ? __kasan_check_read+0x11/0x20 [ 1366.183831][T13379] ? lock_acquire+0x190/0x410 [ 1366.188538][T13379] ? tomoyo_mount_permission+0x10a/0x400 [ 1366.194301][T13379] tomoyo_mount_permission+0x16a/0x400 [ 1366.199796][T13379] ? tomoyo_mount_permission+0x10a/0x400 [ 1366.205452][T13379] ? tomoyo_mount_acl+0x840/0x840 [ 1366.210501][T13379] ? inode_has_perm+0x1b0/0x230 [ 1366.215558][T13379] ? selinux_inode_getattr+0x1c0/0x1c0 [ 1366.221588][T13379] ? strncpy_from_user+0x2d1/0x410 [ 1366.226754][T13379] tomoyo_sb_mount+0x35/0x40 [ 1366.231476][T13379] security_sb_mount+0x87/0xd0 [ 1366.236349][T13379] do_mount+0x1d4/0x1b50 [ 1366.240620][T13379] ? copy_mount_string+0x40/0x40 [ 1366.245593][T13379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.251850][T13379] ? _copy_from_user+0x12c/0x1a0 [ 1366.256988][T13379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.263746][T13379] ? copy_mount_options+0x2e8/0x3f0 [ 1366.269321][T13379] __x64_sys_mount+0x192/0x230 [ 1366.274113][T13379] do_syscall_64+0xfa/0x790 [ 1366.278787][T13379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.284519][T13490] kAFS: unparsable volume name [ 1366.284687][T13379] RIP: 0033:0x45b349 [ 1366.293595][T13379] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1366.313751][T13379] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1366.322179][T13379] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 16:41:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f00000000c0)={{0x1, 0x1, 0xffff, 0x1, 0x4}}) 16:41:36 executing program 3: syslog(0x600, 0x0, 0x0) [ 1366.330455][T13379] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1366.340204][T13379] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1366.348345][T13379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1366.356561][T13379] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000008 [ 1366.400044][T13593] kAFS: Bad value for 'source' [ 1366.427840][T13595] usb usb9: usbfs: process 13595 (syz-executor.5) did not claim interface 0 before use 16:41:36 executing program 2 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:36 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x60, 0x0) 16:41:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) 16:41:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) open_by_handle_at(r0, &(0x7f00000000c0)={0xed, 0x0, "3c7524497e9ab010c80bc9286a8779fb4a92bbc70353bffb9bcd56bf1755e0637ce1be65ad55be5e50fad94248cc9db3cc1c2b93ac9b7e06c2a776b3b1f8f005486d60a7e9229b1dd9dbd34abdb3cf27d6bdec549213bc8bce416435658539698dea57c6f59ead21f27f49f3f32278f54450978dc24cc0cedfa40e7e11717976cd3b2c1121a566500aa5885fd9852b7ce73bc1fed28de06ebc08bd64ffb08c7e960464372b89dc39388071db291cf3612f4799638ef94ea4281a263437e2944d90d909282a0e46888ced0ba3494be9d78c8081bcfdb7973c85b25e114c6cb6981d494dd665"}, 0x10000) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:36 executing program 3: syslog(0x700, 0x0, 0x0) [ 1366.559888][T13601] kAFS: unparsable volume name 16:41:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1366.610853][T13607] usb usb9: usbfs: process 13607 (syz-executor.5) did not claim interface 0 before use [ 1366.617712][T13609] FAULT_INJECTION: forcing a failure. [ 1366.617712][T13609] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.647420][T13609] CPU: 0 PID: 13609 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 16:41:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x440100, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='dctcp-reno\x00', 0xb) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYRES64], 0x8000) 16:41:36 executing program 3: syslog(0x900, 0x0, 0x0) [ 1366.656293][T13609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.666361][T13609] Call Trace: [ 1366.669674][T13609] dump_stack+0x197/0x210 [ 1366.674182][T13609] should_fail.cold+0xa/0x15 [ 1366.678790][T13609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1366.685047][T13609] ? fault_create_debugfs_attr+0x180/0x180 [ 1366.690868][T13609] ? ___might_sleep+0x163/0x2c0 [ 1366.695739][T13609] __should_failslab+0x121/0x190 [ 1366.700716][T13609] should_failslab+0x9/0x14 [ 1366.705233][T13609] kmem_cache_alloc_trace+0x2d3/0x790 [ 1366.710824][T13609] alloc_fs_context+0x5a/0x810 [ 1366.715599][T13609] ? _raw_read_unlock+0x28/0x40 [ 1366.720472][T13609] fs_context_for_mount+0x25/0x30 [ 1366.725535][T13609] do_mount+0x11b2/0x1b50 [ 1366.730000][T13609] ? copy_mount_string+0x40/0x40 [ 1366.734955][T13609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.741209][T13609] ? _copy_from_user+0x12c/0x1a0 [ 1366.746166][T13609] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1366.752563][T13609] ? copy_mount_options+0x2e8/0x3f0 [ 1366.757794][T13609] __x64_sys_mount+0x192/0x230 [ 1366.764329][T13609] do_syscall_64+0xfa/0x790 [ 1366.768850][T13609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.774765][T13609] RIP: 0033:0x45b349 [ 1366.779041][T13609] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1366.798913][T13609] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 16:41:36 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x68, 0x0) 16:41:36 executing program 3: syslog(0xa00, 0x0, 0x0) [ 1366.807352][T13609] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1366.815455][T13609] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1366.824053][T13609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1366.832056][T13609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1366.840046][T13609] R13: 0000000000000725 R14: 00000000004c8a46 R15: 0000000000000009 16:41:36 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) [ 1366.881372][T13794] kAFS: unparsable volume name 16:41:36 executing program 2 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:36 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c, 0x0) 16:41:36 executing program 3: syslog(0x3f00, 0x0, 0x0) 16:41:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8}, 0x9837f955222ec3d5) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)=0x0) r5 = syz_open_procfs(r4, &(0x7f0000000080)='net/nf_conntrack_expect\x00') syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x401, 0x40) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000340)={0x1, 0x102, 0x1, {0x51fa, 0x5bf, 0x7, 0x5}}) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000400)={0x44, r7, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x44}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r5, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xc4, r7, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffff80}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x400}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4004801}, 0x20000000) 16:41:36 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.038122][T13822] usb usb9: usbfs: process 13822 (syz-executor.5) did not claim interface 0 before use [ 1367.090077][T13822] usb usb9: usbfs: process 13822 (syz-executor.5) did not claim interface 0 before use 16:41:37 executing program 3: syslog(0x4000, 0x0, 0x0) [ 1367.165571][T13834] FAULT_INJECTION: forcing a failure. [ 1367.165571][T13834] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.208911][T13834] CPU: 1 PID: 13834 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1367.217637][T13834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.227706][T13834] Call Trace: [ 1367.231065][T13834] dump_stack+0x197/0x210 [ 1367.235423][T13834] should_fail.cold+0xa/0x15 [ 1367.241523][T13834] ? afs_lookup_cell+0x9b3/0x1130 [ 1367.246569][T13834] ? fault_create_debugfs_attr+0x180/0x180 [ 1367.252406][T13834] ? ___might_sleep+0x163/0x2c0 [ 1367.257283][T13834] __should_failslab+0x121/0x190 [ 1367.262240][T13834] should_failslab+0x9/0x14 [ 1367.267009][T13834] kmem_cache_alloc_trace+0x2d3/0x790 [ 1367.272401][T13834] ? __kasan_check_read+0x11/0x20 [ 1367.277577][T13834] afs_lookup_cell+0x18c/0x1130 [ 1367.282468][T13834] ? afs_lookup_cell_rcu+0x920/0x920 [ 1367.287765][T13834] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1367.292977][T13834] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1367.299024][T13834] ? fs_parse+0x53c/0x10e0 [ 1367.303541][T13834] afs_parse_param+0x43c/0x920 [ 1367.308322][T13834] ? afs_free_inode+0x30/0x30 [ 1367.313136][T13834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.319405][T13834] ? afs_free_inode+0x30/0x30 [ 1367.324135][T13834] vfs_parse_fs_param+0x2ca/0x540 [ 1367.329239][T13834] vfs_parse_fs_string+0x105/0x170 [ 1367.334501][T13834] ? vfs_parse_fs_param+0x540/0x540 [ 1367.339757][T13834] ? afs_init_fs_context+0x316/0x5b0 [ 1367.345058][T13834] ? afs_alloc_inode+0x220/0x220 [ 1367.350023][T13834] do_mount+0x6b4/0x1b50 [ 1367.354286][T13834] ? copy_mount_string+0x40/0x40 [ 1367.359247][T13834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.365517][T13834] ? _copy_from_user+0x12c/0x1a0 [ 1367.370560][T13834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1367.376825][T13834] ? copy_mount_options+0x2e8/0x3f0 [ 1367.382038][T13834] __x64_sys_mount+0x192/0x230 [ 1367.386829][T13834] do_syscall_64+0xfa/0x790 [ 1367.391354][T13834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.397253][T13834] RIP: 0033:0x45b349 [ 1367.401168][T13834] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.420789][T13834] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1367.429216][T13834] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1367.437214][T13834] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1367.445204][T13834] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:41:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x74, 0x0) 16:41:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:37 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000001c0)={0xfffffff9, 0x1, 0x2c2e, 0x287, [], [], [], 0x7ff, 0x9, 0x5, 0xe6f, "10383e9a4c532461a688158ceb6f2583"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000140)={0x10000, &(0x7f0000000100), 0x1, 0xffffffffffffffff, 0x7}) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0xffffffff, 0x2, 0x4, 0xedffd0af061930b3, 0x6, {}, {0x2, 0x1, 0x80, 0x0, 0x1, 0xc2, "e2a59c14"}, 0xf5f, 0x1, @fd, 0x60c, 0x0, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x16}, 0x61) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) open_by_handle_at(r5, &(0x7f0000000000)={0x8}, 0x0) 16:41:37 executing program 3: syslog(0x4800, 0x0, 0x0) 16:41:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], 0x0, &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1367.453188][T13834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1367.461173][T13834] R13: 0000000000000725 R14: 00000000004c8a46 R15: 000000000000000a 16:41:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xdb, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1367.555713][T14148] usb usb9: usbfs: process 14148 (syz-executor.5) did not claim interface 0 before use 16:41:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a, 0x0) 16:41:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {r2, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:37 executing program 3: syslog(0x4c00, 0x0, 0x0) 16:41:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:37 executing program 2 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:37 executing program 5: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x100, 0x4) [ 1367.603226][T13834] kAFS: unable to lookup cell 'šþf]uwO,"¹cÐAcݵ‚•´[²$Г5x~µSÞ&Æ¡TW}Ùª™zºCP(' 16:41:37 executing program 3: syslog(0x6800, 0x0, 0x0) [ 1367.725655][T14170] usb usb9: usbfs: process 14170 (syz-executor.1) did not claim interface 0 before use 16:41:37 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 16:41:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0xf0, 0x0) 16:41:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_SETINTERFACE(r2, 0x80085504, &(0x7f0000000040)={0x8, 0xe58}) [ 1367.778027][T14264] FAULT_INJECTION: forcing a failure. [ 1367.778027][T14264] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.845381][T14264] CPU: 1 PID: 14264 Comm: syz-executor.2 Not tainted 5.5.0-rc7-syzkaller #0 [ 1367.854114][T14264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.864176][T14264] Call Trace: [ 1367.867489][T14264] dump_stack+0x197/0x210 [ 1367.871839][T14264] should_fail.cold+0xa/0x15 [ 1367.876450][T14264] ? fault_create_debugfs_attr+0x180/0x180 [ 1367.882282][T14264] ? ___might_sleep+0x163/0x2c0 [ 1367.887155][T14264] __should_failslab+0x121/0x190 [ 1367.892114][T14264] should_failslab+0x9/0x14 [ 1367.896741][T14264] __kmalloc+0x2e0/0x770 [ 1367.901122][T14264] ? kmem_cache_alloc_trace+0x397/0x790 [ 1367.906682][T14264] ? afs_alloc_vlserver_list+0x27/0xb0 [ 1367.912383][T14264] afs_alloc_vlserver_list+0x27/0xb0 [ 1367.917693][T14264] afs_lookup_cell+0xe65/0x1130 [ 1367.922561][T14264] ? afs_lookup_cell_rcu+0x920/0x920 [ 1367.927858][T14264] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1367.933093][T14264] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1367.939002][T14264] ? fs_parse+0x53c/0x10e0 [ 1367.943464][T14264] afs_parse_param+0x43c/0x920 [ 1367.948245][T14264] ? afs_free_inode+0x30/0x30 [ 1367.953040][T14264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1367.959358][T14264] ? afs_free_inode+0x30/0x30 [ 1367.964140][T14264] vfs_parse_fs_param+0x2ca/0x540 [ 1367.969183][T14264] vfs_parse_fs_string+0x105/0x170 [ 1367.971040][T14369] usb usb9: usbfs: process 14369 (syz-executor.5) did not claim interface 0 before use [ 1367.974323][T14264] ? vfs_parse_fs_param+0x540/0x540 [ 1367.974341][T14264] ? afs_init_fs_context+0x316/0x5b0 [ 1367.974354][T14264] ? afs_alloc_inode+0x220/0x220 [ 1367.974383][T14264] do_mount+0x6b4/0x1b50 [ 1368.003959][T14264] ? copy_mount_string+0x40/0x40 [ 1368.008921][T14264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1368.015205][T14264] ? _copy_from_user+0x12c/0x1a0 [ 1368.020169][T14264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1368.026428][T14264] ? copy_mount_options+0x2e8/0x3f0 [ 1368.031642][T14264] __x64_sys_mount+0x192/0x230 [ 1368.036435][T14264] do_syscall_64+0xfa/0x790 16:41:37 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x300, 0x0) 16:41:37 executing program 3: syslog(0x6c00, 0x0, 0x0) [ 1368.040962][T14264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.046970][T14264] RIP: 0033:0x45b349 [ 1368.050886][T14264] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.070640][T14264] RSP: 002b:00007fa627f79c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1368.071876][T14373] kAFS: Bad value for 'source' [ 1368.079054][T14264] RAX: ffffffffffffffda RBX: 00007fa627f7a6d4 RCX: 000000000045b349 [ 1368.079065][T14264] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000240 [ 1368.079073][T14264] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1368.079082][T14264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1368.079091][T14264] R13: 0000000000000725 R14: 00000000004c8a46 R15: 000000000000000b [ 1368.079729][ T23] kauditd_printk_skb: 46 callbacks suppressed 16:41:38 executing program 2 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {r2, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:38 executing program 3: syslog(0x7400, 0x0, 0x0) 16:41:38 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x98000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r3 = socket$inet(0x2, 0x3, 0x4c) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10) sendto$inet(r3, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r6 = socket$inet(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r6, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r6, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r7, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$VIDIOC_STREAMOFF(r9, 0x40045613, &(0x7f0000000140)=0x7811) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = fcntl$dupfd(r6, 0x0, r10) write$FUSE_NOTIFY_INVAL_ENTRY(r11, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$PPPIOCGMRU(r11, 0x80047453, &(0x7f0000000100)) r12 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r12, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x500, 0x0) [ 1368.079744][ T23] audit: type=1400 audit(1579970497.714:2280): avc: denied { syslog } for pid=14326 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1368.091427][T14264] kAFS: unable to lookup cell 'šþf]uwO,"¹cÐAcݵ‚•´[²$Г5x~µSÞ&Æ¡TW}Ùª™zºCP(' [ 1368.109139][ T23] audit: type=1400 audit(1579970497.714:2281): avc: denied { syslog } for pid=14326 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1368.226450][T14377] usb usb9: usbfs: process 14377 (syz-executor.5) did not claim interface 0 before use [ 1368.240373][ T23] audit: type=1400 audit(1579970497.714:2282): avc: denied { syslog } for pid=14370 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239a"], &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 1368.266937][ T23] audit: type=1400 audit(1579970497.714:2283): avc: denied { syslog } for pid=14370 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1368.307736][T14386] usb usb9: usbfs: process 14386 (syz-executor.1) did not claim interface 0 before use [ 1368.308262][ T23] audit: type=1400 audit(1579970498.074:2284): avc: denied { map } for pid=14374 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:41:38 executing program 3: syslog(0x7a00, 0x0, 0x0) [ 1368.372189][T14446] kAFS: Bad value for 'source' 16:41:38 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x600, 0x0) 16:41:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1368.424117][ T23] audit: type=1400 audit(1579970498.144:2285): avc: denied { syslog } for pid=14378 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000300)) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {r2, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1368.519742][ T23] audit: type=1400 audit(1579970498.144:2286): avc: denied { syslog } for pid=14378 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:38 executing program 3: syslog(0x7f01, 0x0, 0x0) [ 1368.564053][T14493] kAFS: Bad value for 'source' 16:41:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x700, 0x0) [ 1368.585251][ T23] audit: type=1400 audit(1579970498.344:2287): avc: denied { map } for pid=14488 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=0 16:41:38 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0xa10000, 0xcb, 0x2, r0, 0x0, &(0x7f0000000040)={0x990a6d, 0xff, [], @ptr=0x1000}}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000100)={@loopback, 0x75}) [ 1368.655113][T14497] usb usb9: usbfs: process 14497 (syz-executor.1) did not claim interface 0 before use [ 1368.681190][ T23] audit: type=1400 audit(1579970498.354:2288): avc: denied { syslog } for pid=14486 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 [ 1368.710125][T14498] kAFS: unparsable volume name [ 1368.735651][T14515] kAFS: Bad value for 'source' 16:41:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="259afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x1020, 0x0) [ 1368.782842][T14583] usb usb9: usbfs: process 14583 (syz-executor.5) did not claim interface 0 before use [ 1368.798570][ T23] audit: type=1400 audit(1579970498.364:2289): avc: denied { syslog } for pid=14486 comm="syz-executor.3" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=0 16:41:38 executing program 3: syslog(0x8004, 0x0, 0x0) [ 1368.826146][T14583] usb usb9: usbfs: process 14583 (syz-executor.5) did not claim interface 0 before use 16:41:38 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {r2, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:38 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="309afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:38 executing program 3: syslog(0xff03, 0x0, 0x0) 16:41:38 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2000, 0x0) 16:41:38 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x203) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x80, 0x0, 0x0, 0x0}) [ 1368.968006][T14714] usb usb9: usbfs: process 14714 (syz-executor.1) did not claim interface 0 before use 16:41:38 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x2) ppoll(&(0x7f0000000140)=[{r1, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1369.095975][T14718] kAFS: unparsable volume name 16:41:39 executing program 3: syslog(0x1000000, 0x0, 0x0) [ 1369.123078][T14722] kAFS: unparsable volume name 16:41:39 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_read_part_table(0x2e6087a3, 0x8, &(0x7f0000000600)=[{&(0x7f0000000200)="0dc212a26a30039cdc65e5b067b2d1131cd9edf894f6ca5bd8e51be99a012fa85690bbc68a6bda5566c6c735962b", 0x2e, 0x9}, {&(0x7f0000000240)="20ca57727f152ae4628f8b2aa2e7e70a19c92f2212426877632c0e05896d12d84b49e2dc5a63527c7ea5cf4f17c30c4c689c28303ccf18955e55a9aa740425f1d16d810cbfd35825d77a6892b46a2aa706cbadc5a858942e6316a607d2617dd2f2e42e55f6ee37b7955fc80cc76d0833f18a79518d6c342549a1409f2d2df0b529efa7893e1e47cae1c25daf0e859d8cd07039cfdcb7acd9ad86f7152cfbdb283c268d97c04b25e82a6350493f1a755faa7fc371c4a33c655723d1d27b0586e6f1029e38316172893bc3e9eee30e56c54fbd0915c4fdf9abfb649336f9b2", 0xde, 0x3c50}, {&(0x7f0000000340), 0x0, 0x2}, {&(0x7f0000000380)="872a1dad7f33ae1810ba825c6102dd5702162e824d6a3f99bd0d53c306ab7b91d8875571888f364f346c6f4c4002d7eab54aa1e83e2ef23dc834f3fd8a0fbdc3943928", 0x43, 0xfffffffffffffc01}, {&(0x7f0000000400)="e125398569ffcc56018635717adf8b750093f97077367579b4788a9e7cddee3b8edbd323bcedea8008c27f8e474d1baed86568b7411ddc7b0072c527fdd7212904b8ceec0d9840188225c76bfd63a6bc9e44a5fe96a192fe5444cb90b5dcd53739907e33e2e731868d0fd8d1913702db1e8123b5374dc84924926dbde11966a0f73606bf55268150720e89d1a21c6eb1154b4b8a222e261d97097112784160d2a542ef1f427ee721f0efb2cf716882fab83d501d87bab84c3d93cc6ea559c6deb0a69cb9d702c1df98eb98d0776b662112a668e130f6a880c966b4bccf07757ade324670abed7c23172b77246379315ee36c07ee512706cdef96a50edb", 0xfd, 0x1c}, {&(0x7f0000000500)="0e0a2d974beed5bd0680c46b9014dbd0c5", 0x11, 0x4f4}, {&(0x7f0000000540)="deb3c4c7eab68ba399da1a29a67fd52398f59c52de002de88025ac9c4cd688c1b1b0b2991d773fcd7cf06bf64cefe53550216b153ed4103018831d15a7d8abe28f161380a36066577a1b46f8489040", 0x4f, 0x63}, {&(0x7f00000005c0)="bc72ee77980a6358f17307e48d44b781dc28cd86eee1d4a82a2791", 0x1b, 0x5}]) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat(r3, &(0x7f0000000100)='./file0\x00', 0x7e180, 0x32) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000140)=""/136) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f00000000c0)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:41:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x2010, 0x0) [ 1369.153883][T14725] usb usb9: usbfs: process 14725 (syz-executor.1) did not claim interface 0 before use 16:41:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="329afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:39 executing program 3: syslog(0x2000000, 0x0, 0x0) 16:41:39 executing program 3: syslog(0x3000000, 0x0, 0x0) [ 1369.294781][T14732] usb usb9: usbfs: process 14732 (syz-executor.1) did not claim interface 0 before use [ 1369.362544][T14737] kAFS: unparsable volume name 16:41:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4000, 0x0) 16:41:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) init_module(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x15, &(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00') ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1369.388499][T14741] kAFS: unparsable volume name 16:41:39 executing program 3: syslog(0x4000000, 0x0, 0x0) 16:41:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="3d9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.514442][T14838] kAFS: unparsable volume name 16:41:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5c9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 3: syslog(0x5000000, 0x0, 0x0) 16:41:39 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1369.589196][T14852] kAFS: Bad value for 'source' 16:41:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e22, @loopback}, 0x10) sendto$inet(r1, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r3, 0x8000000000000, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x2, 0x3, 0x340, 0x0, 0x0, 0x0, 0x0, 0x1d8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3, 0x0, {[{{@ip={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'ip6gretap0\x00'}, 0x0, 0x190, 0x1d8, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0xfffffffd, 0x0, 0x8, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r4 = fcntl$dupfd(r1, 0x0, r2) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r7, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r7, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_TREAD(r9, 0x40045402, &(0x7f0000000200)) writev(0xffffffffffffffff, &(0x7f0000000b00)=[{&(0x7f0000000380)="b321922f62bf470e57f725470265ddb96a114aa5905319c31a430a042241467e4adcbd0c5542d00df3f429c7d873857c8775a0a96b5eff7efbb6", 0x3a}, {&(0x7f00000003c0)="a02d5c70946ae632623cbab7966bf77617eeeb4de33754470ea27344a60910ad51458cb3e63a781a4e269cd01264c608435e1ec18205304073676097090d20f60cd14efc5717ed48ee0b813cb75d4fabcb1186524156e7c556fd3a447bfe994677e33d03811662a3bb584d438f00d3c13028e24c74f0240b6e0741707b03558d48bb07010906d2fd92b02fc952ba2d364b6b2d2e690a405800efc04c38429b3055e7861c2c4602c5caa36e07850fadc6c0b66319114673135900d4d9e73dca41", 0xc0}, {&(0x7f00000004c0)}, {&(0x7f0000000500)="2b685f614c5c3b5ea9bfd2d79242180ac4ce8e901e44aa37ac579774ca139fea5bf09500a618f46aa5f3f4b9e252a1054b2f8e6775a65af2340b9796e643f5b5fb8271d917e768", 0x47}, {&(0x7f0000000580)="6a98683ae9a5284ad04315b22f578dd16a75b711cdb2e9a0236d4f7aea831353b49c94287fe7649323ee01e702e94660890114e66a9b45692196650feb13889d5215aeff8fd34addadfdf3af94dd06212ac79487268399cd8160a29e0f4dc5d3835ad7b89fe6c79f90e380e9bf559e1914ffbe7fa21b23c50adf9e927f33564f3b0f4ddc6ee05f1b9dee4ae0891fe859cbcb4f02d7a5b517acb40ec863f1382f613d6db29022d24d3b0da0be75d9dfa437a62074ca79f35fb95b289bc8a794862264ac26", 0xc4}, {&(0x7f0000000680)="d732a887b9eafd38614f9d547fab04d0a31d2652c0a72368ffa39a3e30bd522db261ba077cbd5c3dd04ad3a53f08541c0a48ae1b37876fa103baa258ea2b25cf06a60ffa719dbbae25c3a54b89cc1908e792de9b0cd87759f3af24dfc85b73433dbae6889385eea6559a32e771e68c3da76430e1f511c9c1bae5068889861407a468a0911c8ef9d428cbae8642697606ac1a68b5891a8b541e0f151477bf7bcba870f5a449a720fb1719100dbef21700", 0xb0}], 0x6) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000b80)=ANY=[@ANYBLOB, @ANYRES16=r10, @ANYBLOB="000226bd7000ffdbdf2505000000340009800800020005000000080001000900000008000100040000000800020008005c972d6b76a80000080001000000180008000100060000000c000381080003000300000054000580240002800800020040000000080004000800000008000200000000000800030006000000080001006574680008000100756470001c000280080001000d000000080001001100000008000400810000001400098008000100080000000800010008000000"], 0xbc}, 0x1, 0x0, 0x0, 0x20040802}, 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x1000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000100)={r11, 0x5, 0x401, 0x7}, 0x10) 16:41:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4800, 0x0) 16:41:39 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.701627][T14857] kAFS: unparsable volume name 16:41:39 executing program 3: syslog(0x6000000, 0x0, 0x0) 16:41:39 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {0xffffffffffffffff, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1369.761754][T14863] usb usb9: usbfs: process 14863 (syz-executor.5) did not claim interface 0 before use 16:41:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5d9afe665d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.801986][T14865] kAFS: Bad value for 'source' 16:41:39 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x4c00, 0x0) 16:41:39 executing program 3: syslog(0x7000000, 0x0, 0x0) 16:41:39 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {0xffffffffffffffff, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1369.920162][T14971] kAFS: unparsable volume name 16:41:39 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x13, 0x0, 0x0, 0x0, 0x1000, 0x0}) 16:41:39 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe255d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) [ 1369.986312][T14976] kAFS: Bad value for 'source' 16:41:39 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:39 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6000, 0x0) 16:41:39 executing program 1: ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {0xffffffffffffffff, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:39 executing program 3: syslog(0x8000000, 0x0, 0x0) [ 1370.109602][T14983] vhci_hcd: default hub control req: 0013 v0000 i0000 l0 16:41:40 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x80045505, &(0x7f0000000040)=0x8001) 16:41:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2e5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:40 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:40 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:40 executing program 3: syslog(0x9000000, 0x0, 0x0) 16:41:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6800, 0x0) [ 1370.303755][T14996] usb usb9: usbfs: process 14996 (syz-executor.5) did not claim interface 0 before use 16:41:40 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) 16:41:40 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="239afe2f5d75774f2c22b91663d04163ddb58295b45bb21824d09335787eb553de26c6a154577dd9aa997a15ba435012283a"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:40 executing program 5: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_disconnect={0x1f}) 16:41:40 executing program 0: mkdir(0x0, 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='#'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x0, 0x0) 16:41:40 executing program 3: syslog(0xa000000, 0x0, 0x0) 16:41:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x6c00, 0x0) 16:41:40 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1370.541344][ T2901] ------------[ cut here ]------------ [ 1370.548255][ T2901] name 'šþ/]uwo,"¹cðacýµ‚•´[²$ð“5x~µsþ&æ¡tw}ùª™zºcp(' [ 1370.557874][ T2901] WARNING: CPU: 1 PID: 2901 at fs/proc/generic.c:178 __xlate_proc_name+0xe7/0x110 [ 1370.568461][ T2901] Kernel panic - not syncing: panic_on_warn set ... [ 1370.576550][ T2901] CPU: 1 PID: 2901 Comm: kworker/1:35 Not tainted 5.5.0-rc7-syzkaller #0 [ 1370.585330][ T2901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.595854][ T2901] Workqueue: afs afs_manage_cell [ 1370.601628][ T2901] Call Trace: [ 1370.605930][ T2901] dump_stack+0x197/0x210 [ 1370.610840][ T2901] ? __xlate_proc_name+0x30/0x110 [ 1370.616647][ T2901] panic+0x2e3/0x75c [ 1370.620912][ T2901] ? add_taint.cold+0x16/0x16 [ 1370.625863][ T2901] ? __kasan_check_write+0x14/0x20 [ 1370.631403][ T2901] ? __warn.cold+0x14/0x3e [ 1370.636219][ T2901] ? __warn+0xd9/0x1cf 16:41:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7400, 0x0) 16:41:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x1, @broadcast}}, 0x1e) syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) [ 1370.640866][ T2901] ? __xlate_proc_name+0xe7/0x110 [ 1370.646127][ T2901] __warn.cold+0x2f/0x3e [ 1370.650830][ T2901] ? __xlate_proc_name+0xe7/0x110 [ 1370.657003][ T2901] report_bug+0x289/0x300 [ 1370.662104][ T2901] do_error_trap+0x11b/0x200 [ 1370.668387][ T2901] do_invalid_op+0x37/0x50 [ 1370.673180][ T2901] ? __xlate_proc_name+0xe7/0x110 [ 1370.678925][ T2901] invalid_op+0x23/0x30 [ 1370.683782][ T2901] RIP: 0010:__xlate_proc_name+0xe7/0x110 16:41:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1370.690913][ T2901] Code: cf 04 91 ff 44 89 e0 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 b8 04 91 ff 4c 89 fe 48 c7 c7 80 07 39 88 e8 68 b2 61 ff <0f> 0b 41 bc fe ff ff ff eb cb 4c 89 f7 e8 f7 c8 ce ff e9 3d ff ff [ 1370.712073][ T2901] RSP: 0018:ffffc900086579d0 EFLAGS: 00010282 [ 1370.720108][ T2901] RAX: 0000000000000000 RBX: ffff88809a3a253b RCX: 0000000000000000 [ 1370.729025][ T2901] RDX: 0000000000000000 RSI: ffffffff815e5566 RDI: fffff520010caf2c [ 1370.737788][ T2901] RBP: ffffc90008657a00 R08: ffff88809ed5a380 R09: fffffbfff165e79e [ 1370.747225][ T2901] R10: fffffbfff165e79d R11: ffffffff8b2f3cef R12: 0000000000000000 [ 1370.755951][ T2901] R13: ffff88809a3a2539 R14: ffffc90008657b08 R15: ffff88809a3a2539 [ 1370.764245][ T2901] ? vprintk_func+0x86/0x189 [ 1370.769998][ T2901] __proc_create+0xac/0x860 [ 1370.775723][ T2901] ? pde_free+0x110/0x110 [ 1370.780584][ T2901] ? rcu_lockdep_current_cpu_online+0xe3/0x130 16:41:40 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000100)={0x8, {0xdea9, 0x80000001, 0x3f, 0xd3}}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) fanotify_mark(r2, 0x37, 0x12, r3, &(0x7f00000000c0)='./file0\x00') ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0xa1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000480)={0x2, 0x1004e20}, 0x10) sendto$inet(r4, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14", 0x1a, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000040)={0x2c, 0x3, 0x0, {0x0, 0xb, 0x0, 'GPLem0:bdev'}}, 0x2c) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000140)={0x3, r6}) [ 1370.789082][ T2901] proc_mkdir_data+0xbc/0x1b0 [ 1370.795204][ T2901] ? proc_symlink+0x1c0/0x1c0 [ 1370.800803][ T2901] ? fscache_free_cookie+0x110/0x1c0 [ 1370.806442][ T2901] afs_proc_cell_setup+0x95/0x190 [ 1370.812867][ T2901] afs_manage_cell+0x54b/0x1410 [ 1370.818426][ T2901] ? afs_put_cell.part.0+0x180/0x180 [ 1370.825442][ T2901] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1370.831464][ T2901] ? rcu_read_lock_any_held.part.0+0x50/0x50 16:41:40 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='afs\x00', 0x7a00, 0x0) 16:41:40 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x420}, {0xffffffffffffffff, 0x1a558}, {r0, 0x1a8}], 0x3, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x7]}, 0x8) [ 1370.840619][ T2901] ? trace_hardirqs_on+0x67/0x240 [ 1370.847423][ T2901] process_one_work+0x9af/0x1740 [ 1370.854549][ T2901] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1370.861482][ T2901] ? lock_acquire+0x190/0x410 [ 1370.866961][ T2901] worker_thread+0x98/0xe40 [ 1370.873097][ T2901] kthread+0x361/0x430 [ 1370.877849][ T2901] ? process_one_work+0x1740/0x1740 [ 1370.884289][ T2901] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 1370.892335][ T2901] ret_from_fork+0x24/0x30 [ 1370.899641][ T2901] Kernel Offset: disabled [ 1370.906774][ T2901] Rebooting in 86400 seconds..