'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 718.637107] audit: type=1400 audit(1556724840.207:13594): avc: denied { map } for pid=21078 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:01 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 15:34:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x80000006}]}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 15:34:02 executing program 0 (fault-call:4 fault-nth:0): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYBLOB="00040a00080cfe0107018000800087ca7c0e04662bad2e41ca26617f80059a007f9e392da13a"], &(0x7f00000001c0)=0x1c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r1, 0x6, 0x3}, 0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1cd80, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0xf) ioctl(r3, 0x8000, &(0x7f00000002c0)="de541f09b4caee9325bf644036326b19145050b138cd4f03cf02b9c23cef3878bb0feed48abe677c98761385a7f4580df9d6c77f495d9b24d8c6cc1649a2bf10063beb17639ff9fb749cfd241f0c10a3d975ac8223b4e116883c90450f02f619be577e10bda6d63a5b3e5117ecbaa9c896c98adb19f555630bb436b97497d23f8c969c7d6b1cd4") r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000400)={0x1, 0x1000}) 15:34:02 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 15:34:02 executing program 1: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="464abcd26cc39a99274190dc9af1587912be6c2f7761f40aa474d9d80ca1d77823d66e99c4287ba8c73a03ecb8fae23bc2025e80999dfaff789c64b72d71b8cca2e023d8bcc3721f9b2b24b8c06ef4cb2e30e2a792c79b9231be1dc0b05f51ba3f47ad16b2129ab097e51666853d967f92eb5d9900da5993f911a02a39090ab029d5d56b103bab1df8399b2abb13e09be8cb986a21", 0x95, 0xfffffffffffffff7}, {&(0x7f0000000480)="30416ba47967dbf07d30952fb1d22b09fd10370744101f97ab06c2400fe00e78db4e864f042190e0d3c0f89e9a3aa47f9ce64e98c036d9153cb8b239bdeceb5c6d91efaefdcfbcc37abd6b0ddc4f5521261dcb7bee87800aab6c5221c91d59441ca0a9ce523eaa635cf6217a37c6789f32f3ff8f5184fc38e596b148a0a7147c70f977d7f5440082f02e4a9fdf875f1cc5541f8e692d07c1e8c4b785f007f3bd33bb9699c80c0bc0ec8065ba", 0xac, 0x1}], 0x8, &(0x7f00000008c0)={[{@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r3}}, {@errors_recover='errors=recover'}, {@umask={'umask', 0x3d, 0x8000}}, {@gid={'gid', 0x3d, r4}}, {@case_sensitive_no='case_sensitive=no'}, {@disable_sparse_no='disable_sparse=no'}, {@gid={'gid', 0x3d, r4}}, {@umask={'umask', 0x3d, 0x8001}}], [{@smackfsroot={'smackfsroot', 0x3d, 'system.posix_acl_access\x00'}}, {@smackfsroot={'smackfsroot'}}, {@smackfsroot={'smackfsroot', 0x3d, '^!'}}, {@euid_lt={'euid<', r3}}]}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="04000000002000020000606e2af761ce6f05000000000000"], 0x1, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000700)) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000540)={{0xffffffff, 0x0, 0x0, 0xb04f}, 'syz1\x00', 0x3d}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000bc0)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532312c72713d307830303030303030ba33a1b0353030303030303030342c73713d3078303030303030303030303030303030302c73713d3078303030303030303030303030303030382c73713d3078303030303030303030303030303030302c72713d3078303030303030303030303030301030342c74696d3b6f75743d30783030303030303030303027f40870a5e9786b6f774ac965f6862b35f86fdd800390ae9f183263c6ccf8c7e69d9eda16c9da337d443d92db8562c37a59b3976d9cca0000000000000078ea62673006b69af54eaa68e14c6fbfbe3ac3e872dfc5f00cb06b1895277bd5a0ee49d5afda717d3f832db5751595ba1c40953940d35df8b0b4c69f154755e491055d9b913ac22cd97ce4fcdceb2ac005d175ada3ae6bb599efc6c14973f7ebfb7ef0e33a70cd8b2a73babfb5c251d0153c78dfa5ab261b21220a920b856ec90ff422e8f9e617a0d56e11918ec0d00c396f265bb3544949c45c56198791c3a40d67b412194c19bfd8ce116d5b67e88600d268", @ANYRESDEC=0x0]) mount$bpf(0x0, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='bpf\x00', 0x600a, &(0x7f0000000a00)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x101}}], [{@smackfsroot={'smackfsroot'}}, {@obj_type={'obj_type', 0x3d, 'system.posix_acl_access\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}, {@subj_role={'subj_role', 0x3d, '127.0.0.1\x00'}}, {@obj_type={'obj_type', 0x3d, 'disable_sparse=no'}}, {@euid_lt={'euid<', r5}}, {@euid_gt={'euid>', r3}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_eq={'euid', 0x3d, r5}}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) socket$inet_udp(0x2, 0x2, 0x0) 15:34:02 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="390000001400810c00d175040f62b04a2b546fc54c1960b89c40ebb373585806dbb7d553b45b000000000000000000000000000000000000c0", 0x39}], 0x1}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x10000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 15:34:02 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x12, &(0x7f0000000080)=r3, 0x4) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 719.797379] FAULT_INJECTION: forcing a failure. [ 719.797379] name failslab, interval 1, probability 0, space 0, times 0 [ 719.851718] CPU: 0 PID: 21151 Comm: syz-executor.0 Not tainted 4.14.114 #4 [ 719.858781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.868145] Call Trace: [ 719.870778] dump_stack+0x138/0x19c [ 719.874425] should_fail.cold+0x10f/0x159 [ 719.878685] should_failslab+0xdb/0x130 [ 719.882670] __kmalloc+0x2f3/0x7a0 [ 719.886223] ? __lock_acquire+0x5f9/0x45e0 [ 719.890475] ? rw_copy_check_uvector+0x1d8/0x290 [ 719.895259] rw_copy_check_uvector+0x1d8/0x290 [ 719.899875] import_iovec+0xa2/0x370 [ 719.903605] ? dup_iter+0x260/0x260 [ 719.907252] ? save_trace+0x290/0x290 [ 719.911054] ? proc_fail_nth_write+0x7d/0x180 [ 719.911069] vfs_readv+0xb3/0x130 [ 719.911081] ? compat_rw_copy_check_uvector+0x310/0x310 [ 719.911100] ? lock_downgrade+0x6e0/0x6e0 [ 719.928832] ? __fget+0x237/0x370 [ 719.932324] ? __fget_light+0x172/0x1f0 [ 719.936846] do_preadv+0x15d/0x200 [ 719.940406] ? do_readv+0x220/0x220 [ 719.946094] ? SyS_writev+0x30/0x30 [ 719.949737] SyS_preadv+0x31/0x40 [ 719.953210] do_syscall_64+0x1eb/0x630 [ 719.957113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.961978] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 719.961989] RIP: 0033:0x458da9 [ 719.961994] RSP: 002b:00007ff06c899c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 719.962005] RAX: ffffffffffffffda RBX: 00007ff06c899c90 RCX: 0000000000458da9 [ 719.962011] RDX: 00000000000001be RSI: 00000000200017c0 RDI: 0000000000000004 [ 719.962018] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 719.962024] R10: 0000000000000700 R11: 0000000000000246 R12: 00007ff06c89a6d4 [ 719.962030] R13: 00000000004c5afc R14: 00000000004d9e48 R15: 0000000000000005 15:34:03 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x480080, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0xffff, 0x3, 0x153169c7, 0x8000}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000100)={0x5, 0x0, [{0x7, 0x3f, 0x7, 0x7fffffff, 0x80000001, 0xfffffffeffffffff, 0x6}, {0xf, 0xaff4, 0x1, 0x684, 0x9, 0x3, 0x1}, {0xd, 0x6, 0x1, 0x5, 0x2, 0x4, 0x10001}, {0x6, 0x401, 0x4, 0x4, 0x7617, 0xe9e0, 0x5}, {0x7, 0x2, 0x2, 0x7, 0x3, 0x357, 0x6}]}) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@default) ioctl$FICLONE(r0, 0x40049409, r0) 15:34:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x1, 0x20000) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000600)={0x0, {0x7ff, 0x7fff}}) r3 = syz_open_procfs(r1, &(0x7f0000000080)='net/netstat\x00') r4 = getuid() syz_mount_image$reiserfs(&(0x7f0000000180)='reiserfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000200)="fd32fd8c9c4c09648eeff6e3f4f72f70d87eadd02776300cd2bc2457bfd12468209197cd90eb7c6e8c2d421b7193c40788b06cf36c364a32e7a7c8895a4ad76ec95237441b77e288234cf28e896922cb34d103546b8075942716a927674721fe49f695dd87c3ecbbd191de4136d76e965e0b0b97399567ab4d5587995d032476514d101b0cb177f01f08adc5974d27b93420bbe02cd7569dbfe8d6618240d06d249d836cf0cb8a9dcda2f2d3ebbf3ff4f1b026c1cac32a", 0xb7, 0x2}, {&(0x7f00000002c0)="f9bfafd8ebd99dcc7cafeea469ea", 0xe, 0x1ff}, {&(0x7f0000000300)="6ab0d5dae183d5e0716f76be16e4359ca882888977211551a64318daa74dc4569204ffea222a07251e6934614af83b4040209a7a2b72c28f5dc1ad79e760ec996d4cbc79db8205e2aa46945029d828200a564dbebf44568e5cfdb30609a14985db3c6a02", 0x64, 0x5}, {&(0x7f0000000380)="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", 0xfc, 0x5}], 0x800020, &(0x7f0000000500)={[{@resize_auto='resize=auto'}, {@acl='acl'}, {@hash_r5='hash=r5'}, {@conv='conv'}, {@balloc_noborder='block-allocator=noborder'}], [{@euid_gt={'euid>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x3f, 0x39, 0x37, 0x77, 0x39, 0x39, 0x77, 0x65], 0x2d, [0x63, 0x34, 0x31, 0x64], 0x2d, [0x35, 0x38, 0x79, 0x67], 0x2d, [0xfc3c766ce5287548, 0x77, 0x77, 0x7f], 0x2d, [0x37, 0x999bb217ce218052, 0x77, 0x76, 0x64, 0x7d, 0x75, 0x77]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0xdc, 0x4, [], &(0x7f0000000100)=0x40}) 15:34:03 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x3ffffffffffffffc, 0x100) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x12c, r1, 0x820, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x128}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x811}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb797}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8c2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xe0}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x72}]}]}, 0x12c}}, 0x90) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f00000001c0)=0x8000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr(r2, &(0x7f0000000440)=@random={'osx.', '\x00'}, &(0x7f0000000480)='\x00self\xedproc\x00', 0xb, 0x2) ioctl(r2, 0x3, &(0x7f0000000180)="0aed3a93b9e09272dc1b123c123f319bd070") syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_execute_func(&(0x7f0000000000)="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") 15:34:03 executing program 0 (fault-call:4 fault-nth:1): recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) mq_notify(r1, &(0x7f0000000100)={0x0, 0x12, 0x4, @tid=r2}) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setpriority(0x2, 0x0, 0x80) 15:34:04 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000040)=0x14) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000100)=0xb37, 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:04 executing program 3: r0 = dup(0xffffffffffffffff) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000340), 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0x6, "482d0118ecd27153c6e8bb7401127846130780301eabe278474b921c04136e7e761f30a48f678d5768325bfa674dafaf226a6d596f68a0bb659c49ea0bc30970b861acce1469adc2f62972d56b47f7b14c69ffacc9a841c7af9282e2ab66042b72275467bd185748f33e42b33981aac188925b9ddf5a8feef0cd492c0698a3e15de0b58b08789b2595807d448e10355b951b0e44d80756b7466d6ad494a8b071222fdbe5d2e822fe6652592b1eb46a8573c143dddc77dff77bbf96a78566d3d0fea3402fd91ad529b36b9bf12f741b55859992b280cff029ad51d1b006e8526c22dbb0c5148d5aef68c5a3ef00ff6ee6f4932ba17cb4238218b96ef52a2715c5", 0x2, 0xbd, 0x2, 0x4, 0xb0b5, 0x0, 0x3}}}, 0x128) ioctl(r2, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x120}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x104, r3, 0x217, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffffffffd664}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DEST={0x68, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x17}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 15:34:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300)=@ipx, 0xfffffffffffffe75, 0x0, 0xfffffffffffffe63}}], 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000080)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@ipv4={[], [], @remote}, 0x4e20, 0x7, 0x4e23, 0x0, 0xa, 0x0, 0x80, 0x2f, 0x0, r2}, {0x20b, 0x4, 0x2, 0x400, 0x8, 0x7fffffff, 0x9, 0x4}, {0x100000000, 0x80000001, 0x7, 0x80000000}, 0x9, 0x0, 0x0, 0x1, 0x2, 0x1}, {{@in=@multicast2, 0x4d2, 0x3c}, 0x2, @in6=@empty, 0x3506, 0x1, 0x0, 0x7, 0x7, 0x7, 0x6}}, 0xe8) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x3) 15:34:04 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f000000c080)=[{{0x0, 0xffffffffffffff52, &(0x7f0000007e80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x163}, {&(0x7f0000007d80)=""/230, 0xe6}], 0x6}}], 0x1, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x3fffffffffffe07, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r1, 0x3d, &(0x7f0000000040)={0x6, 0x6, 0x100}) 15:34:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f00000001c0)) r2 = accept4(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000100)=0x80, 0x80000) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}, 0x106, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000480)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r3}}, 0x18) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000140)={0x1, {0x77359400}, 0xb8}) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000200)={0x7ffffffe}, 0x4) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 722.651273] audit: type=1400 audit(1556724845.077:13800): avc: denied { map } for pid=21213 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/204) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000300)={[], 0x3ff, 0xffffffffffffff01, 0x9, 0x7fff, 0x7fff, r4}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='rose0\x00', 0x298) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r3, r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000180)={0x4, 0xffffffffffffffff, 0x6, 0x0, 0x1e}) 15:34:05 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000240)=0xc) socket$netlink(0x10, 0x3, 0x80000000004) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) epoll_create1(0x8000080000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r3 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="a3ee6135a6891c6ac13e1d946d388a875db1aa775114b730a3a95c394e1feb259fc46b56ea81a3b5d006b92aae989af463c9941c1ab0de00000000b6fed08cd06c7c3f9d6d4b6fbbbd78434e6d2a66e243f6d3bb1f26a474c1cddb266efe3b00bad9aaae588c509249a2e2dd2db02d556dd47732f3df7cb504b40df257a61e578f2600"/142], 0x1}}, 0x44801) sendto$inet(0xffffffffffffffff, &(0x7f0000000400)="1c554cf8b93687aab173d8032491f239015b84dcb4678ad1d63110fe50", 0x1d, 0x40, 0x0, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r4, 0x0, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}}, 0x24044001) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x0, 0x0) [ 723.060283] audit: type=1400 audit(1556724845.077:13802): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.180952] audit: type=1400 audit(1556724845.077:13803): avc: denied { map } for pid=21209 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:06 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") 15:34:06 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x2, 0x0) timerfd_gettime(r1, &(0x7f0000000140)) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) 15:34:06 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800000805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f00000000c0)={{0x77359400}, 0x12, 0xffffffffffffffff}, 0x18) [ 723.393447] audit: type=1400 audit(1556724845.077:13804): avc: denied { map } for pid=21213 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.552466] audit: audit_backlog=65 > audit_backlog_limit=64 [ 723.567184] audit: audit_backlog=65 > audit_backlog_limit=64 15:34:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x10401) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000100)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r5, 0x4028641b, &(0x7f0000000180)={&(0x7f0000fff000/0x1000)=nil, 0x72eb80e, 0x4, 0xc4, &(0x7f0000ffd000/0x3000)=nil, 0x101}) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x200, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r6, 0x7709, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000}) r8 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x2c4000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000140)={r7, 0x80000, r8}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000c40)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000340)='hfsplus\x00', &(0x7f0000000380)='./file0\x00', 0x4921, 0x9, &(0x7f0000000a40)=[{&(0x7f00000003c0)="9dec25393fd5cfedd6475ce08f0a689d5c1a57f0fc4e96ee82847d653638201a3df321593fd055f9f516ee14ed9d51f4400ee581950c6d0c5e23ac6968f65edea76e826ba6ba94e7f0eac2b8b122c8facd1b90fd2c7cc353db5c6b4faee80971fca487431c1205a4dc949dcd61af7f266ac90d65276a3b598b17c154fcd08217900c24252824919e5f7b637709ff528c852d13de25cc16644bdac4467816506dda", 0xa1}, {&(0x7f0000000480)="a26074c261958f5a8d6814bdb28b78c80d265bb1fd29306cb8c74adcb68cd1b025cac7a9a692aa367023fa6995598f4ebcd04cc8f7cd318e7e47fc4a1c80208ab13138a92e80ca4ffcb774e25bea26309e1f30f72604e9b603c7066deaa71d019a0a81f5ba23e36b1cad648858193498d2ef8c98efe9442693072f87d7aa26dba8b9dc0ed194e7a7fc69aae52e1e74068ec1de60a1052cf6712f09288dc4a4ae", 0xa0, 0x4}, {&(0x7f0000000540)="d067f5f549d63144fd39cca8f5da18c48949b5faf3ca203f5aa9176429c7dfc6402acee99752f9c46794201f9a5984f12168b62af3604148948fd75f9d65d087b9b2efc8bb6a10b8a0fd493d6a1d2754e29675a1a078e5d8fec6b910f7208936952faf99d7a72e959c90ba1d6c920681", 0x70, 0x1}, {&(0x7f00000005c0)="788d761bb37c095677647ef4306022c381ef577600b966d2d463710c541bf18ae9ac9abefbf5eefec50ab7e83736d8570da2f6d1a46124f0704cc51e2896337f838abe74f6eb2957bcf62734ce3bb24a3a9e2661d3e5eec43e99910e24ca372b1f91308df302235f10fcfbf270521d484d479342e0d4cefbc0fe02d6f1ad884e1ce0b74d5c5aec004e187412e487506f719fec52200ef4e2dc0dbc8c2e341ea61e1b4496ad380043b521a4a1a5f741600ec2df277d9a62e7fa04344c272868a7f2b97d83350c38aa78312f4e37c0ffcd", 0xd0, 0xde}, {&(0x7f00000006c0)="2f28355b6e75fff7a88abf02ee8de52221fd2773ce1c3c39b35b3209bfe02afa333ab7f3b5eaacd272302e887f1c112cec2bbc63d136782903a43770b04d8b6d0770a2195884b461e06abaed0ab8b85e5a9185eb79e708ef35875f04730b3f6ca027d725e290e2f8b0036b9406f7b34afeb4d9dbdb21ac4890b11926f31459c475be711084c884fa6068ee0b7a7799fbaebd8c78ba23c77adb617d56eacf54ed8e44f73d8dd23ed2fe79cbeb0e5499", 0xaf, 0x7}, {&(0x7f0000000780)="ae7eba00e845825ed5b652e07b80cf2e6d710ba96d47da31d74df8bb2115874e533ef10ad02e9c2145694828d3297da1673cb67bbb354f2f498ef76dde315647dcad807a5be3d71264a1ea603977c584a47cffe778501102049417241e7f32a0bafc307533b5dc07516f6cd6f81a3dee5c96e3cbbf5cd09fa66a2501244f45afae1467934fc8e1030d3295a256afc3137f0cb9db03d5d6", 0x97, 0x2}, {&(0x7f0000000840)="84683c545f2aa7250a320c9bf5cf3325635fbf07b6ee985725fc42d59c50c1afcd11267e886b20d7260c7814f9fc5ea518ac9939beac64962f4a8bbe4369eed233484a7351d769a7714c4cfd6dbb11a76a440c73149a5c7345e9955fa5", 0x5d, 0xe3}, {&(0x7f00000008c0)="1d2d10ffc5e510dbde0cedcc1b393c2ff7d46fda1bcbde86afb73319690b986d7d53369f6f71df07e0eb4db26de46f7ffdd351fb3141653b992547c5efafcff85c8f044aef4891ce5f8bb9a463bd65ced7b6cfd7617d15fd45c1c734f5446852078645f4df1251a353539ed8bed540c7226bb620bd73140d7cef5c9efd1e750b495abeb79aab9f71294cb7eda16791eac85c018b7c3e62e3da16af916226c4f51ccb6a9930046d5653a8d3835fe4df1f2c96b2f0552e981c430242a0997363e8f857374ff7750f534377997ae398afb6", 0xd0, 0x10000}, {&(0x7f00000009c0)="30dc91d59cddf61d14e3bbb7932fe6824656e7aa2bde0cc573602aaaa68ff2a68b8f733341fb749ed07e855535877d9c5ebff8dc91e335642425c349c39aeab6ba2e9914abea5555eae9c99f908a5097347fb714ca738778f7cbd09a1e2e6b", 0x5f, 0x6}], 0x10000, &(0x7f0000000c80)={[{@session={'session', 0x3d, 0x9}}], [{@permit_directio='permit_directio'}, {@uid_gt={'uid>', r9}}]}) 15:34:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x800) prctl$PR_SET_TSC(0x1a, 0x1) sendto$rose(r1, &(0x7f00000000c0)="2156ab9a961f6c9d6de9ee058a2501a79fa6ae8f7b238c1369898e02e228172dfbabf2dd802261cc72a7b2897af52bc3fe074f626daa6fa95ac182aadaf4707e67fc4b4bac8eae1b30740af74d013ef738c05004b59faabcc173ee9d2ab60fcff96d032764b3a2908d1518ece01417ca0ea55a7a284d6d7fd850c63f58951c73b4db847885706ed8e76656e4b44760ed44", 0x91, 0x800, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000000)={0x79, 0x600000000000000, [0x48], [0xc2]}) 15:34:07 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4400000000000001, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x303) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:07 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x40000000000016b, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:07 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9a0d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x200, 0x4) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 15:34:07 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r2, 0x10000}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r2, 0x8}, 0x8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000980)) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x1}], 0x1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x101, 0x6, &(0x7f00000007c0)=[{&(0x7f0000000340)="1a10411b68d66239615849c50c197929bdf94c2b00ff5ef11d8e33420bb0f9ced18a1b5e32a761d69f0bc2ed872ef127b724341b59c5098f1ab39405011bc9f966ce26ccdf7a9baf61b1eea14142b3ba5a8f4f1432fc503509e42cff9f426302c84ef2bcfba33b6947aeeec798cb558ae8cb6a5751a8a7e6b9d50bdb626360951a40ad2b0865683fca8bb78e053f140420574316985ff4168d328a23c40b06d8f47e7dfb6505c19d1a0127421224eadae21113ff", 0xb4, 0x4}, {&(0x7f0000000400)="ff7c78648862cd7e96fbbb0b7e4d58452e6ed25eb3ae4705c60c7efbd3c989a4d18fb7cb49087ddf9822a9f90abfc1c66b06c398ed8a648de8bd7420a705ffd2384695a589cd2a5c2a41fed54126d37b1bd9c1ca583c430769026d48c75d6eea37101a7f092d9b5184451141c236c3379a34349da0864fd200af3d4272ab27d4db0f68aeb3b58e7c43bfec72029681a3ead2dfc1cb7b0721b7ed35253546801e8c0f2a30b9458091f6b4d9ab", 0xac}, {&(0x7f00000004c0)="d166e5f0651fb7a79618ea6a10bb3a3f7edf05def62e5659f809536444b43624e50b700eb02c9304", 0x28, 0x8}, {&(0x7f0000000500)="794a0b5222953a4e59b0f8cc2cdd46e438faa402aa8d4df4d208e902cea4b7d0283dd6bbf628dd0d823abc03dc372bd7cc3fa4e0f7eaf14ad63f8404bec71e15d5294267f5a7f30b8d76376b196ee7f9a2347029748ef682abc1916fc3c1a16bba53ce26b414cdbf5e8a069294a71cd389e8fe8a07588c94015a080b0800cf5ba43ffa137de0956428ff51c800e699fa76da0bdeebd9bc5c974f2561822df33979db62f08e84ef92eac357a21f647166ea14989920d7b5aec00c321fc7f2", 0xbe, 0x1}, {&(0x7f00000005c0)="23898d4f6e868d8f452aa58854eeb391ac91f612cac96ee46f7cf062f7a3f1014f98c6187e3624ac5798e92b67350439fa4ff360e912bce86945d0001e4cda96da90a62eb41265dafa7b157234a59ba136c8379f8ebaddf82c7d88473bc2f2f56789f12f3c5098f0963c8225b326a2254e7a85b468f3910fb8998f38615ae48e23f356b2160910bb4ccd5e2ad9499aab0b4053ffa3036af63c33f3007a28efa76ff3fb4349dc939605d4c5559535df39b3f1ac013919cf3f9323953812", 0xbd, 0x8000}, {&(0x7f0000000680)="6151366fa2b957ed421944ed145ffcc9db6dd17650c6bfe288bd83fb6655a20fe628ee33b7d16666c67d774263b391c8567558aa060c74e1c3f64a18b3830233069ae2cbb402ffd11fe42726f7d617ccf577c75544259181890416f1a337d5008ca57fa4b08d037df2c302ffd5098b2a5df888670097df1cc4817db93c66627f945fd23c2591cc9a54fb4dc8c6cb64fb9283660aa6452b7a252d97eba1e37e3fe74e3895a55aae20", 0xa8, 0x7fff}], 0x400, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6e6c733d63703433372c7569643d0717c173e7bd3df6076b6befd4ddf242b7fae82a8724846629704c44cbfcbfe2ea0c4f7a8a9768e34954cb198537e95716b406a728e711d2a8c959ee0ba08d1adb4a36a0edb9245dfe922c34ef0afee91c82df1a0e8c0d3b066a3d70f3fd124e007a8c4ff628dfccdc11c1cc1f30706d62c17289f35d3783b999b81d8ceff30c77b394e998602d49c16aee511530783c9c362c7a4898814686510ae3ba6da8587885db183552f18ad8ad", @ANYRESHEX=r3, @ANYBLOB=',errors=continue,fmask=00000000000000000000777,fmask=00000000000037777777777,errors=continue,fscontext=user_u,\x00']) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) 15:34:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x3000010, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532302c6163636573733d636c69656e742c63616368657461673d2c70726976706f72742c6e6f657874656e642c6163636573733d757365722c63616368653d817363616368652c736d61636b6673686e743d2c586f6e745f6d896173758f652c666f776e65723c5f290915e5bc3160a6e49fa53a5deb391ab8c143bbde07a5cea7de9fc860a3830f0d2158205a91d2d39ba74d6f6519fe86d8c6", @ANYRESDEC=r1, @ANYBLOB=',permit_directio,dont_measure,seclabel,defcontex~=unconfined_u,\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x0]}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x8001}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000300)={r4, 0x6, 0x3, 0x0, 0x7ff, 0x1000, 0x0, 0x3691, {r5, @in6={{0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x9}}, 0xf6, 0x4, 0xffff, 0x738f, 0x7}}, &(0x7f00000003c0)=0xb0) syz_execute_func(&(0x7f0000000000)="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") 15:34:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f00000053c0)=[{{&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)=""/148, 0x94}, {&(0x7f0000000140)=""/17, 0x11}], 0x2, &(0x7f00000002c0)=""/4, 0x4}, 0xd9}, {{&(0x7f0000000300)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/103, 0x67}], 0x2, &(0x7f00000004c0)=""/59, 0x3b}, 0x100}, {{&(0x7f0000000500)=@l2, 0x80, &(0x7f00000027c0)=[{&(0x7f0000000580)=""/6, 0x6}, {&(0x7f00000005c0)=""/121, 0x79}, {&(0x7f0000000640)=""/8, 0x8}, {&(0x7f0000000680)=""/218, 0xda}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/6, 0x6}], 0x7, &(0x7f0000003180)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000002840)=@nfc_llcp, 0x80, &(0x7f0000002b00)=[{&(0x7f00000028c0)=""/169, 0xa9}, {&(0x7f0000002980)=""/100, 0x64}, {&(0x7f0000002a00)=""/200, 0xc8}], 0x3, &(0x7f0000002b40)=""/86, 0x56}, 0x2}, {{&(0x7f0000002bc0)=@tipc=@name, 0x80, &(0x7f0000004280)=[{&(0x7f0000002c40)=""/57, 0x39}, {&(0x7f0000002c80)=""/153, 0x99}, {&(0x7f0000002d40)=""/97, 0x61}, {&(0x7f0000002dc0)=""/140, 0x8c}, {&(0x7f0000002e80)=""/31, 0x1f}, {&(0x7f0000002ec0)=""/13, 0xd}, {&(0x7f0000002f00)=""/130, 0x82}, {&(0x7f0000002fc0)=""/131, 0x83}, {&(0x7f0000003080)=""/72, 0x48}, {&(0x7f0000004180)=""/220, 0xdc}], 0xa, &(0x7f0000004340)=""/191, 0xbf}, 0x1f}, {{&(0x7f0000004400)=@x25={0x9, @remote}, 0x80, &(0x7f0000003100)=[{&(0x7f0000004480)=""/250, 0xfa}, {&(0x7f0000004580)=""/103, 0x67}], 0x2, &(0x7f0000004600)=""/15, 0xf}, 0x7}, {{&(0x7f0000004640)=@generic, 0x80, &(0x7f0000004780)=[{&(0x7f00000046c0)=""/162, 0xa2}], 0x1}, 0x7}, {{0x0, 0x0, &(0x7f00000047c0), 0x0, &(0x7f0000004800)=""/56, 0x38}, 0x4}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004840)=""/205, 0xcd}, {&(0x7f0000004940)=""/194, 0xc2}, {&(0x7f0000004a40)=""/229, 0xe5}, {&(0x7f0000004b40)=""/104, 0x68}, {&(0x7f0000004bc0)=""/200, 0xc8}, {&(0x7f0000004cc0)=""/245, 0xf5}, {&(0x7f0000004dc0)=""/146, 0x92}], 0x7, &(0x7f0000004f00)=""/204, 0xcc}, 0x7dc3}, {{&(0x7f0000005000)=@isdn, 0x80, &(0x7f0000005340)=[{&(0x7f0000005080)=""/168, 0xa8}, {&(0x7f0000005140)=""/79, 0x4f}, {&(0x7f00000051c0)=""/82, 0x52}, {&(0x7f0000005240)=""/210, 0xd2}], 0x4, &(0x7f0000005380)=""/58, 0x3a}, 0x80000001}], 0xa, 0x2000, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'nlmon0\x00', 0x8000}) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:08 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x0) 15:34:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r4, 0xc0404309, &(0x7f0000000380)=0x7fffffff) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xe) setresuid(r1, r2, r3) 15:34:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={0x0, 0x5}, &(0x7f0000000240)=0x8) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000001c0)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000540)={0xac, 0x0, &(0x7f0000000380)=[@release={0x40046306, 0x2}, @reply_sg={0x40486312, {{0x1, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x18, 0x28, &(0x7f0000000280)=[@flat={0x73682a85, 0xb, r3, 0x4}], &(0x7f00000002c0)=[0x48, 0x30, 0x0, 0x30, 0x78]}, 0x401}}, @acquire={0x40046305, 0x2}, @enter_looper, @reply_sg={0x40486312, {{0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x40, &(0x7f0000000300)=[@fd={0x66642a85, 0x0, r1, 0x0, 0x3}], &(0x7f0000000340)=[0x58, 0x78, 0x18, 0x28, 0x20, 0x38, 0x78, 0x78]}, 0xc39}}], 0xd3, 0x0, &(0x7f0000000440)="a8e91d28ecb66b5dcb2150a6c3e80adee11a70d5fe409aac65c9ec494caca6ac2c1c13a37991aef91e0c6171dd3287f31f01fb055e5120563c631b5dda02e43ce541550e0f72a316c633deda519b077daaa7505bc5f0279ef4a3c7d0bccbfa72c7d50cf0cea5282302e430282de5913b5cb90464d4b9fc16a54588cbeda7c1c4d55fd199bba4800ffe591d39c4f91a146e2f05de5edc30e6b460dbe5c69f62f0f4b4fff0d9c1a9e48fa7e00b4899fdf3c9ab1a1c145cc896c6033e2702ffd5a2cacf89b557058ed90435f6882e9b7f52e49516"}) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r2, 0x4, 0x3f9, 0x3}, 0x10) syz_execute_func(&(0x7f00000006c0)="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") 15:34:08 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x7fd) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x2, 0x400) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000080)) r1 = dup2(r0, r0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) write$sndseq(r1, &(0x7f0000000000)=[{0x5, 0x0, 0x0, 0xfffffffffffffffe, @tick=0x3ff, {0x0, 0xfffffffffffffffd}, {0x0, 0x3}, @quote}], 0x30) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) 15:34:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x87, @remote, 0x4e21, 0x0, 'wrr\x00', 0x0, 0x8000, 0x76}, {@local, 0x4e20, 0x2003, 0x51, 0x7d59}}, 0x44) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000540)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000580)={r2, 0x1, 0x6, @random="c44384084429"}, 0x10) 15:34:08 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x8, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xa302d2) lsetxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x40, 0x1000000000003) write$P9_RLOCK(r0, 0x0, 0xffffffffffffffe7) 15:34:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000400)="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") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x280102, 0x0) write$selinux_access(r1, &(0x7f0000000040)={'system_u:object_r:devicekit_power_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xfffffffffffffffa}, 0x50) 15:34:09 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)={[{@xino_auto='xino=auto'}, {@metacopy_off='metacopy=off'}, {@xino_auto='xino=auto'}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/thread-self/attr/current\x00'}}, {@dont_hash='dont_hash'}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x32, 0x34, 0x37, 0x65, 0x32, 0x31, 0x36], 0x2d, [0x65, 0x39, 0x7f, 0x61], 0x2d, [0x77, 0x33, 0x73, 0x63], 0x2d, [0x61, 0x67, 0x76], 0x2d, [0x65, 0x7f, 0x77, 0x65, 0x62, 0x38, 0x7f, 0x62]}}}, {@obj_type={'obj_type', 0x3d, '#wlan1{:proc'}}, {@subj_user={'subj_user'}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@hash='hash'}, {@dont_hash='dont_hash'}]}) r3 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r4 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x3f, @loopback, 0x3ff}], 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r7 = dup2(r0, r6) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r7, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:09 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xff, 0x4000) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x10010, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x4, 0x10, 0xffffffffb81a3b72, 0x8}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={r2, 0xd9, "77fd4026bb77161ab60cec2c49a8ac4f43676ce9a8f674ff648d99007867a423a1f26a1f17c762f18759376ddc290e6fe812f0d200692e68c921561a33983224119e5f6fe82397573b1ca2580143f47ecebd3d78ac4980c65048c563488ebe499a41e835711182a3852bd0b3773db0b2f7ae7a92dbd36e87de8f3fdef617fe90ce5c11fc42397d8e01709a52a3201c17cfbebad8f387c22a38e2681a83b3a34da1696ce7bf7559cfe2f70650b03dd5ed28cbdb5c2a110c91bbba5904019fbeb435cda05f05c5e10ff166d0f73c8ab7a58666c1f909f5d98c07"}, &(0x7f0000000180)=0xe1) 15:34:09 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/cgroup\x00') open_by_handle_at(r0, &(0x7f0000000000)={0x4a, 0x7, "44ec10ce4737f2bd31fec53647a1023cfa52a3792e0ad03fc160441bf861c7f26684ad44e4657da6b5f0011b46a1cb146468d2bc813dbbb71b19cda063b5781e2a85"}, 0x10000) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000540)="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") [ 726.451529] IPVS: set_ctl: invalid protocol: 135 172.20.20.187:20001 15:34:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001, &(0x7f0000000200)="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") r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'nr0\x00', {0x2, 0x4e23, @broadcast}}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000380)=0x2) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) sendmsg$nl_route(r2, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000002100200225bd7000ffdbdf250600140429000000080000000b00000008000100e0000002080004005500000008000200e0000002080015000200000008000b00050000000800010000000d79"], 0x50}, 0x1, 0x0, 0x0, 0x8044}, 0x1) [ 726.630136] protocol 88fb is buggy, dev hsr_slave_0 [ 726.635271] protocol 88fb is buggy, dev hsr_slave_1 15:34:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000600)="0113000007000000efc070") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet_int(r2, 0x0, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = memfd_create(&(0x7f0000000640)='hash\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f00000003c0)=""/178) unshare(0x8000400) r5 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f6, 0xfffffffffffffffd, 0x0) r6 = gettid() kcmp(r6, r6, 0x0, r2, r5) mq_notify(r1, &(0x7f0000000480)={0x0, 0x2000000003, 0x0, @tid=r6}) write$P9_RREAD(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="3e000000750200ff07000053573292023783546d8eb62c77bba27f3c730e236e81e9ac7072ca373868c168863ddfc38c798d411d46038190895a8d9f805a76c7af1f35f55b80601f40cdb1e2"], 0x35) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80802, 0x0) write$P9_RATTACH(r7, &(0x7f0000000200)={0x14, 0x69, 0x1, {0x6, 0x4, 0x2}}, 0x14) ioctl$TIOCSPGRP(r7, 0x5410, &(0x7f0000000100)=r6) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r7, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="ffff00000000000000cdaaaafda6000000000000000000d0e24264e55d38d4909776b316c479"], 0x1}, 0x1, 0x0, 0x0, 0x4801}, 0x10) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null\x00'}, 0x58) clone(0x8000002102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000580)) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 726.870246] protocol 88fb is buggy, dev hsr_slave_0 [ 726.875557] protocol 88fb is buggy, dev hsr_slave_1 15:34:09 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x81, 0x840) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)=0x1) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x4000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000000c0)={0x55, 0x0, [], {0x0, @bt={0x81, 0x5, 0x1, 0x0, 0x0, 0x8, 0x13e, 0x7, 0x8, 0x9, 0x2, 0x6, 0x1, 0x1, 0x8, 0x4}}}) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x200000) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0xb69}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x6}, &(0x7f0000000100)=0x8) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 15:34:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000280)=@full={0xb, @remote, @remote, 0x0, [@null, @rose, @netrom, @rose, @rose, @netrom]}, &(0x7f00000002c0)=0x40, 0x80000) preadv(r0, &(0x7f0000000680)=[{&(0x7f0000000300)=""/45, 0x2d}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f0000000540)=""/187, 0xbb}, {&(0x7f0000000600)=""/128, 0x80}], 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0xfffffffffffffffb, 0x0, 0x2, 0x0, 0xf5, 0x73, 0x7fff, 0x7f, r3}, &(0x7f00000001c0)=0x20) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0xfffffffffffffffe) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f0000000480)={r3, @in={{0x2, 0x4e21, @multicast2}}, 0x9124, 0x8}, 0x90) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000280)={0x0, 0x80000, r5}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f00000002c0)={r7, 0x80000, r5}) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r6, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r8 = dup2(r6, r6) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0) sendto$inet(r6, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 727.882860] audit: type=1400 audit(1556724850.177:14031): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.034838] audit: type=1400 audit(1556724850.177:14032): avc: denied { map } for pid=21349 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfffffffffffffdca) read$alg(r1, &(0x7f00000000c0)=""/214, 0xd6) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000023c0)=""/4096, 0xfec8}], 0x1}}], 0x1, 0x0, 0x0) 15:34:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='net/arp\x00'}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f0000002380)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/arp\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) preadv(r2, &(0x7f00000023c0)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000002440)=""/12, 0xc}, {&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000001200)=""/204, 0xcc}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f0000002300)=""/5, 0x5}], 0x7, 0x4e) 15:34:11 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1000000005, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0xd5) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = dup2(r0, r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xcd, 0x400000) r3 = dup2(r0, r1) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000000)={{0x8, 0x2, 0x6, 0x7, 0x101, 0x8001}, 0xfffffffffffffff7}) sendto$inet6(r3, 0x0, 0xffffff4a, 0x0, 0x0, 0x0) [ 728.201483] audit: type=1400 audit(1556724850.277:14033): avc: denied { map } for pid=21356 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:11 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000140)={0x7, 0x13, 0x2, 0x2, 0x3, 0x3, 0x3ff, 0x9db, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x1000000000000}, 0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r4 = syz_open_procfs(r3, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/udp\x00') ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl(r1, 0x8001, &(0x7f0000000100)="8aa3df4e00caba47773ca919a6d2a73994110f52cd4e7603067c9d3788331fe1649f34a37d80c9feafbad01907d4a8b9e2b7739efc211df818b69a554a23b4abb7d709ab7e2a89bcfca91eec3b77d0f0ebafa73cc49406f198a7868c3a21c42366f323dd759c4c75361620454bcb7b7a08e9582e44bc6849297c60bb54021bb780d36e994a4222a8d337133d24152406e9b7550e73844e056ec147748a2975694b9fc2fa82c2897b0fe6171b4141262e6187c1836b229e923bb1c42a4f29d966e36f89577baa57b94148f9945b731852b975364b203ef47202161c7f4d46647ee691babffedf8de505") ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}, 0x13f, 0x3}}, 0x238) r5 = open(&(0x7f00000016c0)='./file0\x00', 0xe083, 0xc2) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000001700)={0x1, 0x5, 0x6, 0xabf, 0xff}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r4, 0x1b}}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000200)) r6 = syz_genetlink_get_family_id$team(&(0x7f0000001780)='team\x00') accept$packet(r3, &(0x7f00000017c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001800)=0x14) accept4(r2, &(0x7f0000001840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000018c0)=0x80, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000019c0)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000001ac0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000001cc0)=0xe8) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000001d00)={0x0}, &(0x7f0000001d40)=0xc) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000001e40)={@rand_addr, 0x0}, &(0x7f0000001e80)=0x14) getpeername$packet(r1, &(0x7f0000001ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001f00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001f40)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000002080)={@multicast2, @empty, 0x0}, &(0x7f00000020c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002100)={'nr0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000002140)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000002240)=0xe8) getpeername$packet(r0, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000022c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002300)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000002400)=0xe8) getsockname$packet(r3, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000024c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000002780)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000002880)=0xe8) getsockname$packet(r2, &(0x7f00000028c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002900)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000002940)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000002980)={'irlan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000029c0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002ac0)=0xe8) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000002b40)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002b00)={&(0x7f0000003180)={0x744, r6, 0xa00, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x1f4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x51}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x87f}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x170, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x8, 0x400, 0x0, 0xfffffffffffffffa}, {0x4, 0xfffffffffffffffb, 0xff, 0x1}, {0x82, 0x5, 0xfffffffffffffffe}, {0x81, 0x5, 0x800, 0x1e80}, {0x1, 0x8, 0x5, 0x2}, {0x1, 0x7, 0x6, 0x3}, {0x10000, 0x9ccc, 0x1380, 0xffff}, {0x4, 0x5, 0x59e01cfc, 0x1}, {0x3f, 0x9, 0x2b93, 0x1ff}, {0x7, 0x7f, 0x7fff, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}, {{0x8, 0x1, r16}, {0x12c, 0x2, [{0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x280, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x6f9c, 0x9, 0xa459, 0x574c}, {0x5, 0xa8, 0x1, 0x9}, {0x80000001, 0xea, 0x3, 0xfffffffffffeffff}, {0x101, 0x8, 0xfff, 0x4}, {0xf2, 0x200, 0xf66, 0x1}, {0x8280, 0x3, 0x9, 0x4}, {0x4, 0x9}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7d81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x70d}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}]}}]}, 0x744}, 0x1, 0x0, 0x0, 0x1}, 0x0) accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x80000) preadv(r3, &(0x7f0000001680)=[{&(0x7f0000000400)=""/248, 0xf8}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/80, 0x50}, {&(0x7f0000001580)=""/252, 0xfc}], 0x4, 0x700) 15:34:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x7}], 0x340, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000150000,user_id=', @ANYRESDEC=r1, @ANYBLOB="35100000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',allow_other,allow_other,default_permissions,\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000040000000000000000000000000000000000000000000000000000000000ed0000000000"], 0x28) 15:34:14 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x10001, 0x40) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000580)=@assoc_value={0x0, 0x8}, &(0x7f00000005c0)=0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000300)={'y\x00', {0x2, 0x4e21, @loopback}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000600)={0x0, 0x1000, "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"}, &(0x7f0000001640)=0x1008) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001740)={0x0, 0x6}, &(0x7f0000001780)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001680)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x4, 0x5}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)={r3, 0x7b, "dcc405178c3799fa37539b95afecc3bd5f1a3eb8feb91f121619ea7a508172baa3b18317cf609a678194a14504b0f50a01faa7bad8b9f35c4fe4b1a3783fead71eaea08f8f269970544ef99cfc9a7a4a1012aeba64d3f49550081ab2877066bc8f1baa03eb97e61df5a66664100797303c5ec30587131132e4022e"}, &(0x7f0000000480)=0x83) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) read$alg(r4, &(0x7f0000000080)=""/214, 0xd6) write$P9_RVERSION(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500001e65ffff0104000008003950323030302ecbafdaba45ee924c"], 0x15) [ 731.270133] net_ratelimit: 20 callbacks suppressed [ 731.270139] protocol 88fb is buggy, dev hsr_slave_0 [ 731.280270] protocol 88fb is buggy, dev hsr_slave_1 15:34:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 731.430128] protocol 88fb is buggy, dev hsr_slave_0 [ 731.435271] protocol 88fb is buggy, dev hsr_slave_1 [ 731.510577] protocol 88fb is buggy, dev hsr_slave_0 [ 731.516329] protocol 88fb is buggy, dev hsr_slave_1 15:34:14 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fsetxattr(r0, &(0x7f0000000040)=@random={'os2.', 'posix_acl_access@\x00'}, &(0x7f0000000080)='eth1\x00', 0x5, 0x1) syz_execute_func(&(0x7f0000000100)="0c16b5b598cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec2427d82c4c17950e100c4da7676f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f000e0f0bc030c030363ef80f996603c1896ee4e424c4c17c28c647000026400f0d18c401fe5ff6e3df646736676670664336660fd2938c000000880f01c314c392f80f17720d14111d54111d00") 15:34:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x41c1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x80000, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x40000) unshare(0x40000000) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9e, 0x200) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) 15:34:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) ptrace$setregset(0x4205, r3, 0x7, &(0x7f0000000140)={&(0x7f00000000c0)="7d19e406d47d30efec98c33a164f33cfe116cc9004f3d68a03098295c93efdd4796aa2ff6b9bdf7a1282d742f0a2cb631f89bfc3a419e3678e0cd2ef3efcf46e351e7a85011b1864be84a3bf266b6135a4", 0x51}) r4 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(r1, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0xfffffffffffffd6e, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) fallocate(r4, 0x10, 0x1, 0x6) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) sendmsg$key(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2, 0xe, 0x0, 0xd, 0x6, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x4d3}, @sadb_x_sa2={0x2, 0x13, 0x40, 0x0, 0x0, 0x70bd25, 0x3505}]}, 0x30}}, 0x20000015) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x0, 0x0) [ 732.276691] audit: type=1400 audit(1556724855.107:14264): avc: denied { map } for pid=21493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.390129] protocol 88fb is buggy, dev hsr_slave_0 [ 732.395310] protocol 88fb is buggy, dev hsr_slave_1 [ 732.412622] audit: type=1400 audit(1556724855.127:14265): avc: denied { map } for pid=21493 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.476421] IPVS: ftp: loaded support on port[0] = 21 15:34:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect(r1, &(0x7f00000001c0)=@ipx={0x4, 0x7ff, 0x9, "02a4eea03748", 0x7}, 0xfffffffffffffeff) poll(&(0x7f0000000100)=[{r1}, {r1}, {r0}], 0x3, 0x0) [ 732.575336] audit: type=1400 audit(1556724855.497:14266): avc: denied { map } for pid=21511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:15 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) dup3(r0, r0, 0x0) [ 732.702016] audit: type=1400 audit(1556724855.497:14267): avc: denied { map } for pid=21511 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 732.804425] audit: type=1400 audit(1556724855.517:14268): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:15 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x2, "e2710576b22db7cf"}) [ 732.870148] protocol 88fb is buggy, dev hsr_slave_0 [ 732.875386] protocol 88fb is buggy, dev hsr_slave_1 15:34:15 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") [ 732.963733] audit: type=1400 audit(1556724855.517:14269): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0xfffffffffffffeea) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r0, &(0x7f0000000140)="ce0310000013000000911efc1fb35c22cc6dc37916217d8599b512eceb92bd30961166bf00000000070000000000004d1b39be61fdadec4d8159a56e", 0x3c, 0x24000840, 0x0, 0x0) [ 733.105233] audit: type=1400 audit(1556724855.537:14270): avc: denied { map } for pid=21511 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) syz_emit_ethernet(0x7a, &(0x7f0000000280)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "fe2dd5", 0x44, 0x0, 0x0, @mcast1, @remote, {[], @gre}}}}}, 0x0) [ 733.265456] audit: type=1400 audit(1556724855.557:14271): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x1, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/63, 0x3f}, {&(0x7f0000000100)=""/154, 0x9a}], 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 733.440211] audit: type=1400 audit(1556724855.567:14272): avc: denied { map } for pid=21511 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f4946c5b3aaf5cc61726f5fe4259b75cf9245273f319bd0f0") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r3 = getgid() fchown(r0, r2, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = socket$alg(0x26, 0x5, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = dup2(r4, r5) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) close(r5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000240)=0x22000000000d) syz_kvm_setup_cpu$x86(r5, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x4000066a80646, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x10000000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000, @perf_config_ext={0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r10 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x7, 0x4000) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r10, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r11, @ANYBLOB="000629bd7000fedbdf25110000004400020008000400e48600000800030004000000080004003f000000080008003f0000000800030001000000080009000600000008000800bc0000000800070005000000080004000300000008000400020000000800060090daffff0800060005000000080005000080000020000100080001000a00000008000801303b00abd564230e2a4f7700080000000c000700070000000e00000008000500010000001800030014000600fe800000e649bdd500000000000000aa"], 0xc0}, 0x1, 0x0, 0x0, 0x800}, 0x40810) setsockopt$inet6_tcp_buf(r10, 0x6, 0x0, &(0x7f0000000580)="7db9348617d66caa509885dc58c261e9bd20886977fa271a8535cf13757b4a9be71b31ff6c52d7817fd10b18ba5a12d917a6f9935b0f5daf0083db1727e42db03f70ee749d4e7742e8cd85d8ea2f25c477d9f3d684687018e397ecca8a827097e8d4e010a2dedf0d7bcdac395c9ac5853e18a9c14132021d57d15358d02287d829cf2796f9cf2346a2ec9b2487adbf85c3a3d256bb608e1afd3c5b7b8ed9b1c81be440719dda465acb1bf872edd09864b7e935062f41b8607f292136dcee7eeb1b01fd060bf39c6ced18746535df5f6dfdb0dcbc5513729afe8a36559c55657735fd3231bec0f69d9540f9d5afbaf6b5aa308e4ae151f4d03d29fa138872ea7e5999a0a27c95f4a2fa53de49429dad300dd5ae938e7e5643c8fa48b46be8a75f56896d0650cd64e6b17129e2d8bd391039ce769fec52905a1ec758fa775eca986e180ce2720c554d2ba52f5b8168f57f3b62c15256feb65b5607d72ba4aa45ac95e05f78e024496e62920d176a42db4fce00217c532d94ed75f1409dc9f91ea2da84261810edb42a58ecde54f83c56b7b4c11fc56d2e1d27fb90100219f54c993fde80d570ef1afecccd65057363627dde353974c9f540b5727a5521b2176bfb7df1a0ecedd9261f8a68ac257ceb6a8f80dd5a4b0d2b2e450c29b3c9b3c38fb7dd03fbfe7e794e6b4685a6e1e157f5c8b04dce61f1219a775cbb3fe403dc382b34e2a8cc7de6c9478c1548539051693d54f54ba098787d7d70713d7c1a3f60ef7b9d718094beba57ef9e5e6bc395381ef36c1b4b7808cbdb136a7d1a95e52d8278d2f191e1fbd08cd2efc5a4c121681986be4655dad787eba5c5f908d14747723970e8d929c2a906f3dbe430ed069403cd1d49d773073fcea331a68293b4dec36bffff8dcf2baf14bf800afbf8dcd33549d31782276d9db5ad3303063825ec9627a336bd14e57105f48168fa323fbac37233b5053de108fd95b897ef88e4fb4a51bf45db53a802bc831fb4b1bb779caa1426b2e21ef0f77df0ddc07d4803c4935ea774541b3071d131a84d3a767248525baf5ab75e0c934ca7a20135ba931f10adf1be6b3c377b6593552e2db59b40f0156ae9d80d36474871ae4c25410f3c843f51fc579435e56b96e5d6735c79ad5da0575ac7930659b8e126f3fbc1280c6e1c269ed90c6ea5601b0c402cd58c9bd7b3071cd3e3d6cb0db5cd034e17aba0c1b22660c2eace7a823f830e3ca57e775548e80376577f0672003c904f199466ea8d3a249aa5d8edf040cd147e3fcdc51792e19fece05f86cddb177a8159c274414e56b68a8e7dbbc85bdd8f846e2da528f8e9f58dbbca40c70dccac0da577eb4fa4d2ac952a86506a90a3d001326434c94b723c9908e89678adc3bc7eabda19762e3a3fc3d0d31a4f6acf32b9ba9ebb78557e6de28238586d6242ab672fc30b8830dc85caa6780b5f190ca774981c10fe45e66588607ceceee0e876e0442196bee1b557d7b23356d1b11ed3c910ac9ebc629a9c0982c37af19449ae8a36eb318a619b56d940e271a03d8807d552b6f0bcbbeb878ffaa6e6021c5bf143090eb8d0ba5bd49abaac1e5823fe20939f81e9f4b7fec7f93a684ceaf37d00287c056ef3f3ba69973511d7f5105fa853e451b35957a8859da270b3015bbde7a9646c4f3ee9847381e8b0ec59bda1bc3ca2c2dbfaff94ab91611568618d55e560cbb6a0df99e1c21e5064d134a3f1fc9a13397bb86deeaa1f9d6955f49c372664b610289fc84a000bc4b7fc55f8b7beb55a7e10634a46bc67306d89c8836ed56adfa634e21b8c3b81c7f43d4defca3ddda6ea877ebbe6e1c3acae76a117b1fb3059946762bd8bc1b9306339700d959a3258e0cbabe5949776c7a9b147af719b1ccdd53ffc64d7eeb73af494ac99e18324fc7e3e8c3abb53b4e6d32e19423fbdc26872c69ead7a56c4c6760c79574b88a7df4afecd3aa334e2d101f59006702362a2dc062945b3555c2e1fd3e2cfcaf05ca229630f4b4e81fc9e8fc9b81b035b697cf0bfd080f582910b48d0cf0d9beabd36ff44024506575658b4bea226c0f0d4e843838e2160579660dc98a8e59c918adf430be9c89c58199e56d6d2703440152f792409f392884ff88a5a95c1b0b566317c28ba816837e06a4a85d86d73381877cfc05eb901d04ae4ec36e4a512f2449885cf2dcc1119f74c07bc4b199cd8e355923a2b51677b0b4afc190745e7b22d958d5db2d5fa24caa1c7dbe633ca13460c7257f9e524576849e1f91b16e12b56ba884e957bd1b971ef9262f7ee4449b3e708066f68bf86f92df1324725eab356df79700c841302b740b364ec62cd2bccc87608e083917ae61527d3a6aeda3a340e419969c3e2bcd81fa911672b7e542648d3b4c4aba127c1df102f074122d9ae206dad7bbb08847d38f24aec2bffdff4cbefcfff5e19a11103760ce2a047549056d1373a8ce85a91ffacc68b25e5c40d904e36ffa431348e2b764be63218882467e2d37bb1782f2bbfab8cb553a95a1ad381ba123ff4e9209156a442792aafdbda52c9c0f3659232604d4dc33a8b73befa3964680e8f30695b1e3c5f3c1636ec1dd14ba719fb8718759ff1b53e6b4b693ebd2d26fdd505e9829d1dd39ef27f6ec41cd5a13fa18b88d5d3aa7c89ec4c0bfcef6b6a21b75380652de052c22c22f09d6f87c1554a8233a8a4934af8201b0dea46dc2e9745cc331a7a237282fcff84ad9321ee751b084290c76f82184af7070a4e3efd40b199f7ccb455aa49afa251a48660ee80fe560d950d297246fee44120e60b5bf611cc4bf4446ba137b4a6be3fcabd0aa293fc7213f8071353c4aaf76c5cfb7deee24489b1d38f965615426737f35e814d252dd21df42e66ea8e82041527b25371340a3b73907b9a503e66901918840018964b41d450f8ca036afe981e5ee1eb204afbf30ef8f5335fcb16530206232c0566a9cfbf32f1ad947d2c656641da3e39a24b7fa3cf35b265f3d17de56678ae8e35b66f3407768b47d70af63e847b8fa210ec70740bb84f8f7c30e590cc1c387c3baea0882279f9ee9a0f7882d79ad929d056cc30c1abd832ab4eb09b48f9b128bc106efaf561573c96430cf6048d0612cc83512389e3866343a0b19058e3b9cff922898a2eab44ef93628a5aabf5c9ae07f884ffc8554e5dfa55c3bb91f38f6ef8c90dfe5931cd6f63816f3447ab409c1d79119ae69eb5ee8ef9b83806c5be5fabba6432c23abb14ab3b8a3bebb8092374e70de34dfb7089c33ca272c3a26d5cf5b1432dbd7ca79930333280e917e31abaa84eb8e033991258fa556a56986dd47bdcfb9fd4841a1824d9a6a23805c75d39f4d4450b1923c61ca2934839bd8cb769cd0a2b2f84895cbf0ea4ffa078b7a2785548c6d84af0b5f7b3e54908456ff435434cbdc2cff2db023b2a1ef5352ac7aca409bec482b51025862d49cd7fb4d5b0e9cb6c2176e9437e158c6dc86ef7872ea5920c18c9ff4abb040729cca5cda89e545925ce066d72b04e9da0fcc30570237988b76a816d711283fff9e26d4a13313aa02892124e6f7807400a97c08ad53b2ce38722cbb3ca6fe82e035535205ba45f0ad90968b600e595030776030670f9a28718886d846ab7fce0109bda390779827d1b0dc0426e6e055d897d1e997f2840a587995fb45b40ee72fc3df4ba76162cbb47bff4865ebc4f67b165d4875019048ece2f6bdb2f5a8b109a00ba53ed8b0c12c9747203b14821b7bbfb8d2ec0c2a5419ba7cad5c8c25027bd84a0914deeb92998bfa34d5ab48fd2432af365baf0285145b2f52fbdf1563d3141213a91707c643cb07216333c8bec6e230cb95720308d9ba2d4dcdd15fbfbf3e576fd2c3e9dd99982a311d654b1428ca45b48de940ec864dd1d95e9a295df6abd343f401ec301aa30646f08818a05d794bb961b69fe6a62d46a45fabe28a2880349e947e5a927d9e87907490d7bde32915c48ecdff68393bc8fccf9a196265ceb30d3ff92832cb6c3cc5c17cc42578c0665884000fe8145705b1d3cc431c1ee7c0d8d9149353ffeb867ce18dcaf23baa77e90d7f028c7a1e575e2145775876d772333320b7d375009ea7f866be5c7fb5309dec8d499ef60c4e4fcc7eeea937a5e69e9237105d2fe174e6305fcf4d011d467ba4bf63d720acb58b5a55409fa28dc98c7e196ebc826cacc0e539798f87637097f748545c17055d43832d5d0d4262bafc322242b5bbc1f2c309bebbafb9b6b9c1975818664b2e3725908893afb4ad113507e21e1cb8b34cff99825cdb3d49fe7fbece52882c62ce674958faed3d35649914704356b8cd8beaec30f4a956bf7fad017ed78b63fa3e8c3c24e15a4abd85e04e640381b519a29027c483e37221ff1a0f7781b3a9637313d6e9bcc3b39f95178b97ba0271358bfcb9544043c59af07e2c8be2dbd62c96c323e000ab279f0c7da3537fa01d10a9b75c7aa5a7cfe717d932dd49295bfbd8d5536834cf663d58d11574a52b4fd2007536acd4b741099f7e91264178d6c5ecca9a3f46ef10e058eded178b18431fe52b671f5bcbb5ffc63e9e0e525b9f791a6fc68dfa733f8318af60b80980e36e2598580538d8bcfb45a6f86c766c60287f5f5f2ec13777f3cfdea072fab1e235531cc0d985b7d253e37cd41a672277d80638debee63fef5f6da796c684a6432384319b0217b1cf6e00fa0b17791d00d60b59cc3be0b3d7be1f4270eb4c61138e3b4be187491a24907213d99f5099df96f2f13a51127a9f5575f31bfba7ac66afaa739bef8a1a4d0f5906ce2b7e602fb7e9db989bde78c40a2984ec872e506a5dbd1b63fb9de3d43d539b4b92bba8ebe61d695175ed1b7682e447d26b10149598b1aa52178dbd8fcc85ece1156cb9725593d43179c8e3af01e26893247a41646d32de485531729988c9666cef93f5269a6e1660ee77d2933833096f45e1c75c2e1112c684ea6a387020f52caa470f8d31bdf20746be708ea389d7ee18b9a65de50eafbf1e7bd254be7f748e044a1b6ea7b0ad7211792845abe0519642c6e99f24a8eb62483e7d935fe754effb12ababa067175ee81f5a248a6a432c5ddd24ef03a9050877dbaa6a918fb6aa8951979f5aa3cbd48536fdc745c579f5e7ac094d1c868c83872c5fc49dd534b17e83d41f3516f3dc86ccc74fb1986d871182272dbba2c60c9d45352843a73af3b402824aa8d9f9304555e8a16a2d920f5f1470b28e76353de5696f4d759cf3bf542eb98808bc98941eeb414d24d411749b27ddfefe424d3871cd8e7e9f801ef475f0506e0b2056be4900590196066cb9dc8fb115d051ca81168647b9ab1165e6b87f4dc33503648b0b5440a791413679c1d596d18da6e49edbfe0f8a1e122afe2f91906c3aaf98ef060d9cb2adac5c8c191c9d2b43c327cccddd3f281bda7e6fe89e6652b9847f796ccb7df0bc0f481cf97bf609d138cf2c97c0dc556a2162afa2ba4d5d5e530833d9bf439e2a602039954b33cce26764956a4d1951aac2a9946d1a13e15345553b69c71bbf22356c0b3624d707a366a205e4489c2550aba384f02e930d29056f01fd412cf3478618264025261075f4cb80895f8a79138df7215fe8e407a58fb086506ff8b4b368b8ef67008569328c48781e293850a63ba24cf30b5785d8d9eae916fa918898146ca622c66aae2b1684524c3cd496653151ff75857b972349b3407e220cca9df2e3d0f6cd04d674df658c18b8d40d2d8e224bd68b47ec6561d86e57cfad016c86a54f7870f5fdaf08e7fe108897258c14193", 0x1000) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x2a7}}, 0x0) 15:34:16 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f00000000c0)={0xf8fc, 0x101}) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$selinux_context(r2, &(0x7f0000000040)='system_u:object_r:syslog_conf_t:s0\x00', 0x23) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffe0c, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:34:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x1c000, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000300)=r1) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000180)={0x200, 0xf7fffffffffffff4, 0xfffffffffffffffb, 0x81, 0x11, 0x8}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x23, 0x6, 0x7, "a3a83ba7fd79fcccc8b782ed7f963a63", "3bc743faf34d938fd87abe2841fe"}, 0x23, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, 0x10) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000001c0)) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r4, 0x6}, 0xc) preadv(r5, &(0x7f00000001c0), 0x1000000000000013, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x5}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r6, 0x7fb, 0x7c0c1d23}, &(0x7f0000000540)=0xc) 15:34:17 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x2000}) 15:34:17 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ace57b870671363bfc3d63cc1f5d4da337c3f62c21d820"], 0x1) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) fallocate(r0, 0x3, 0x7ffe, 0x8001) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000001c0)=0x3) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) fremovexattr(r2, &(0x7f0000000280)=@known='user.syz\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_GEM_CLOSE(r3, 0x40086409, &(0x7f0000000180)={r4}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 15:34:17 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xcde776260bfb484c, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180)={0x1, 0x100, 0x8, 0x74, 0x5}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r2, 0xa57) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x8000, 0x4) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f00000001c0)) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 15:34:17 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000200)={0x3, 0x612c}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x4) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xfe08) recvmmsg(r3, &(0x7f00000086c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000042c0)=""/40, 0x200042c8}, {&(0x7f0000004480)=""/4096, 0x1000}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x8, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000800)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000008004000080020000980300004001000098030000980300009803000004000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000867a117bf23377aa5aeee3d80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00011129628867b0f0b2b9f7c6b0d4001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000ffffffffffff00000000000000000000aaaaaaaaaa2500000000000000000000ac1e0001e00000020f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000180c200000300000000000000000000ffffffffffffffff08000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000180100000000000000000000000000000000000000000000000000002800434f4e4e5345434d41524b0000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x4d0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000700)='/dev/vfio/vfio\x00', 0x18000, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000007c0)={0xa, &(0x7f0000000740)=[{0x6, 0x9, 0x7, 0x6}, {0x1, 0x9, 0x800, 0xdd2}, {0x8961, 0xffffffffffffff81, 0x0, 0xd9}, {0xf2ee, 0x3f, 0x9, 0x2}, {0x400, 0x7f8000, 0x6, 0x7}, {0x9c9, 0x3, 0x4, 0xda3f}, {0x800, 0x9, 0xb7, 0x4}, {0x4, 0x5, 0x7}, {0x8, 0xfffffffffffffff7, 0x7fffffff, 0x8001}, {0x101, 0x6, 0x6, 0x7f}]}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = syz_open_procfs(0x0, &(0x7f0000000080)='core;T\x80\ndump_fil') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000480)='net/ip6_tables_targets\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/7, 0x7}], 0x272, 0x701) 15:34:18 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:18 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x2e681d53, 0x10200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x400, 0x6, 0x200, 0x80, 0x1, 0x2, 0x1000, 0x4, r2}, &(0x7f0000000240)=0x20) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0xfffffffffffffff1}}], 0x1f6, 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) r3 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x4000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@allow_other='allow_other'}], [{@measure='measure'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@fowner_gt={'fowner>', r4}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@measure='measure'}]}}) 15:34:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0xdd90, 0x0, 0xb4}) 15:34:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000380)) r1 = syz_open_dev$midi(&(0x7f00000003c0)='/dev/midi#\x00', 0x81, 0x210040) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) dup2(r0, r0) r3 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000005c0)='trusted.overlay.redirect\x00', &(0x7f0000000600)='./file0\x00', 0x8, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) getsockname(r0, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000040)=0x80) ioctl$KDDISABIO(r3, 0x4b37) getsockopt$MISDN_TIME_STAMP(r5, 0x0, 0x1, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)) r6 = getuid() fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r4, &(0x7f00000004c0)={0xa0, 0x19, 0x2, {0x42, {0x42, 0x1, 0x8}, 0x62, r6, r7, 0x6, 0x6, 0x9, 0x8, 0x3f, 0x7, 0x4, 0x5, 0xffffffff7fffffff, 0x1000, 0xaf1, 0x9bfb, 0x6, 0x2, 0xffffffffffffffff}}, 0xa0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'ip6Iret!p0\x00', {0x2, 0x4e24, @loopback}}) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000580)) getpid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000640)={0x2, 0x61, "4171d9bc7a6d5f8fb3fda9abdcb91caf27729269dfd10d2fc464602df095be49eeb046aa091236459fb0367ed9d6fd61b754ea650f77583139afafdd328ec9a815b387b9123e8764f38af4c0bf69a553301ee80df3906ee5e90376a4bf602f5c22"}) syz_open_procfs(r8, &(0x7f0000000100)='wchan\x00') [ 736.550120] net_ratelimit: 20 callbacks suppressed [ 736.550125] protocol 88fb is buggy, dev hsr_slave_0 [ 736.560274] protocol 88fb is buggy, dev hsr_slave_1 15:34:19 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000340)={0x2, 'team0\x00', 0x4}, 0x18) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x2b, 0x4, @thr={&(0x7f00000001c0)="3232e3d53d34dedd23d7c05a5527d4387b8ba54bfd9e5275d72fbbd4064e7f31e5db387ee7da96f445648b3629691957d8f6b3f54445ed08dc108e219edd032b9e678fb9ab0b1a4d2f97c55711f72c3eb9080d7286955e01cc8b8db8011b18d8b3c88ae3", &(0x7f0000000240)="7eb71ff7f1d5deb74f46a9defcbf513a2f5ff8d842beb5279662b77af3797a9621a30f40de6c5704651d1448db8f9976c223557de93d301e3e71fd01d30171d736acefc6244b2d653c707f0eebf0ee6336bc2e737254a5750afbc089d77725bb91b83bb81e5002109c4210217c582a407aa9456e30"}}, &(0x7f0000000300)=0x0) timer_delete(r2) syz_execute_func(&(0x7f0000000000)="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") setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000380)=@req3={0x7, 0x5, 0x100, 0x4, 0x0, 0x47c}, 0x1c) 15:34:19 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x80000) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) socket$inet6(0xa, 0x0, 0x478a3133) [ 737.030167] protocol 88fb is buggy, dev hsr_slave_0 [ 737.035326] protocol 88fb is buggy, dev hsr_slave_1 15:34:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x100000000000e15, 0x90000) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x5, 0x1ff}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x4080, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000002c0)=0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000480)={[], 0x2, 0x50, 0x6, 0x8000, 0x6, r2}) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x1, {0xd7ad160000000000, 0x0, 0x5, 0x308}}) r3 = accept4(0xffffffffffffff9c, &(0x7f0000000740)=@generic, &(0x7f00000007c0)=0x80, 0x80800) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000280)=0x9, 0x2) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000080)) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000c00)='SEG6\x00') rt_sigpending(&(0x7f0000000240), 0x8) sendmsg$SEG6_CMD_GET_TUNSRC(r3, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x4c, r4, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x2, 0x9, 0x2, 0x8000]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x3}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r0, 0xbc, "182ba1662fcd1f36cb1db20bdfc8d4f95e5f63e922ee05ee1eee4ea3c0cd78558c1b083f77f257d912d66d8b35cb54f47eea762c4fe33d1e8755c8332c629a95f536751c143a680dd4dc48c73d9b9bc49141648bb7cfcb11eed726803318f2551a3895cff2417498aebe8a3b994eb9855fdafce2a1b265cf9c6b9860313bbb39b0286cd56a60a988873b4ab404467ac4462c3d1d495fe55f5853a0f1b3d90b0e61c4d0db6dd865ed35d22de5ee7986bea1340bacf936190b501579ee"}, &(0x7f0000001980)=0xc4) [ 737.280119] protocol 88fb is buggy, dev hsr_slave_0 [ 737.285281] protocol 88fb is buggy, dev hsr_slave_1 [ 737.320190] audit: type=1400 audit(1556724860.137:14511): avc: denied { map } for pid=21632 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:20 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e22, 0x1, @loopback, 0xffff}, {0xa, 0x4e24, 0x100, @empty, 0xfffffffffffffffc}, 0x1000, [0x5, 0xfffffffffffffff8, 0xfb, 0x9, 0xe537, 0x1, 0x0, 0x37]}, 0x5c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/121, 0x79}], 0x3f, 0x700) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000200)) getpeername$netrom(r2, &(0x7f0000000080)={{0x3, @default}, [@default, @default, @default, @bcast, @bcast, @null]}, &(0x7f0000000100)=0x48) 15:34:20 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000002640)={0xffffffffffffff80, 0x101, 0x5, 0x100000000, 0x4}) sendmsg$nl_netfilter(r0, &(0x7f0000002600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000025c0)={&(0x7f00000001c0)={0x23e8, 0xa, 0xe, 0x420, 0x70bd2b, 0x25dfdbfb, {0xe, 0x0, 0x5}, [@nested={0x1294, 0x1e, [@generic="e4a94be1f371089c115e2937ccaa25ef92217b3669dfcde1eb44943ef26bd9ac61fcb9c16532c4d126360ae8f2e30d5670f17df0a1356485f183b68d1e8776e606e5220234d36d8f", @generic="f5f353be7e03a23b88303d5ca982919b308770aaeab5ef31c8346f80eb3a739d2b218c34975321637eca57cef5196446dd77c070d8b68623fdd673517dce413668fec704de0ffad123e96b4e7145fee8fac7f93b4e9f7a41631159b33585a401c39e7d91b5850cda9c3e50a5b12efc7fcc7529b6bd797599c3260d9996a5f5c8b5b6ebbdb3dd0b82c7b340d480a8ac604ccbfc4c1eb567547fdb906f5e8e62b0bc04be4ad632a412eac69e8868ddf883f75c3bec83fe81ad07a302f1adc023b8b5360ae260c6cb83e1d538d5", @generic="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", @typed={0x6c, 0x60, @binary="1b750d1efb47693a5b6e9fb5b896a4e96bfb9d6963bf925ef756de9476d2872ebc45c1acbc13ba9cad003c10a422a525319f266444a863e5960c25d95cf4ecc08739b879db9eecbf97dd197e16cdf442252bba5aadfa8c2505f61f784d4329adc51355cdca63"}, @generic="e2e52391575aeb73e76433df853d82ea80692b9faccfb565ac98467e7c976f027112f231959d49a05f13486f18321e", @generic="ffa0c96eed82f18161f222cd1c0e40c71bb6e97fca33c3d01bd261df07d9bf13c6d6ac8a473d1a9d01aa0d13643957b11dc7cd85ee09d671f56dccf6cc1774dc705978120c2a85fd8b20c53d58834a8df9c1c394560796702488e7c9347d341d8905704830d63f58f417995d675ad1cbff809182a0f0df9710dfd6c7f24e14d37c72ce5d483a619618d8e8fb3663d88c5d50993a06ba4a7aea271e73935dabef1427d97a2cdd0b164250e960f4b47285798dfc3ae9e90ddf376de0f6cb2ca94c22e811fd86775f404ae1c488c7068f051f4823d54e7792c092171cf67627b187"]}, @nested={0x10ac, 0x22, [@generic="92d77021a015f685c948cd6c30c5aae00f87f671fc6e58e340b05c1a1f0b539476e92e6a064d67724f20433a701e638cd6707123acccd5913a3b97b6016d80401547a24fc7d11099f2a956bc69dab147f071930c45d7820541ef875634dd2b8f6e217b18a1f6391ca4216b01be030164338c4fdc618fc0d1f9b3b0f2cdacdd39d6d827da05402982ab370112856c7091d85e00453e783f2be10d8363521f4460b6155c0768", @generic="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"]}, @nested={0x3c, 0x82, [@generic="ba27a0dcb625183393170f55a6395c011eede331c76f85f14d17f0280c2b17135f2e8f5c4dd6", @typed={0x4, 0x6d}, @typed={0x8, 0x48, @u32=0x7}, @generic="a033db"]}, @nested={0x58, 0x60, [@generic="d47294ea62dd6557b36a7f2cd8f8f3836ab443a7ecad518b931ac9cbb546f3c8f4ae7f90dec7a6f7808698b1cf42f69477e46c2da4ad2df5a2156f730838d7444fde735d98d9c7ed8dc55c36cb7255d5b4f6b653"]}]}, 0x23e8}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") setsockopt(r1, 0x1, 0x8, &(0x7f00000026c0)="671c5d7754e12d68fc39e856b6569288ebd722645f27296dcdfba2f6cf764bb934b210f6321c06123aa9594121545e1576ae3cc8390e4e332036037a3881ce26587dd9f1b809cbb110a1edab04eff88044972ec31b9cea8c7f5fd8f4923c98787b567567353513386fd8cfd9cf8365", 0x6f) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000002680)={0x15, 0x0, &(0x7f0000002640)}) syz_execute_func(&(0x7f0000000000)="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") [ 737.490098] audit: type=1400 audit(1556724860.157:14512): avc: denied { map } for pid=21632 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 737.514912] protocol 88fb is buggy, dev hsr_slave_0 [ 737.514965] protocol 88fb is buggy, dev hsr_slave_1 [ 737.670157] protocol 88fb is buggy, dev hsr_slave_0 [ 737.675320] protocol 88fb is buggy, dev hsr_slave_1 15:34:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f00000000c0)={{0x3, @netrom}, [@bcast, @rose, @rose, @bcast, @bcast, @default, @netrom, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x0, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r3, &(0x7f0000001440)=[{&(0x7f0000000240)=""/61, 0x3d}, {&(0x7f0000000280)=""/17, 0x11}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000000300)}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/228, 0xe4}], 0x6, 0x700) [ 737.801392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:34:20 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) vmsplice(r5, &(0x7f0000000180)=[{&(0x7f00000000c0)="7896325d5883c3787930400357ab6cb74ab750d4b1f12f906b56683d974e48f8964a63c7a042ebdb7349076c9764986295098bbf7455018bf6db5678b727207e7d2f542fbd3cff9075b6bd5559c5018942a28fe6e1608a2b1842ceb740b2d09b9db377bb116ba880876e79c26bd7d5ddd46ff9a3d9acf4999f407fef833cb1ba65aeb7b3e1b26c1c8cc9feb8fe588520e2349126ec2a6cb19e484e7454c9ce8c085ed4d767ff979086f96a800ef2cce9eb4c6f1a03", 0xb5}, {&(0x7f0000000280)="572724ee2431883e54d394b95854b9f9a71a064f98f4688c2e853c6715165855d8d1225450b2512bcdee9a5faa932d95bb70a4f5c49dee7907f85be21194c8669dbf15fc4f93cee4de228fb4da53f5825c9654c7dfca48e7fe13192c3fc9883a2ba7e70f09ab999092ed57909067156207f101dcb595fd82bf2549d9af82e35cf24158b91dabca62b07b0faa9056241e3be49d83b11b219dccd4b35ac346c998", 0xa0}, {&(0x7f0000000480)="198e402fa20d874f8d40e7c8d611c10fde0364d0b05c65e81ec773cb6fafb0153b8f694d55a9d13f35c1fc15c31d28b9aa1c9485c194106ad89a0d699e3622fc575852f6395dc4ce03e16dfe890f806520ebaa75558166b72d6d3cffdedda2928885944d77a1c6c1e482943442f4a3391496d18eba3be6bd2b3d974b6c2932ae7f3b72faa57130b73a98b6b4dae590a79526a401391fcf59374d79ce297cd9eeb029e77b23cbcc98ec46a55b8e1de6fa7a45dc5f6ac131ca31f8106e3c2d6d05e8794617d187a546e1f53756cfc73b22de3f2b33f4ad37a19077794f3edcc5002e5d4a1efab3348f9ef584f5f7bf57242943bc1a050a1b", 0xf7}, {&(0x7f0000000600)="f66eee66e0e6f6f771d19a34fe320bde87bf43c94e424ec4fbf87a595d5c007e6f77332c7affa62c4b5c67fbbf2d8861b34f3fb8b71dac9f28cce25f3590b38bc3870c9e74a171d13d1302f1e83f28159a9ede54f478561d59db39dbedabb0636b9917cbde38a5d2bb461209f922c99916bc864d5764fe605b7222e79b699a91772ed4837493bd51478cf369f29a9edea9b4d83628ea", 0x96}, {&(0x7f00000006c0)="92ddd90256a464056852223404fb5ff4300998f3a6c136e5095522e759fca2f6d0666f3ae69b171346b3b641d41facce1ab43e55eb2386b20a165633bd9ddce1d24556c40c5bf74e8d2ea0e98f7391905701e348964c24a40e0aae81bac4cc4cc425f30f17a133beea93b6d55474bd11a1f92799d01f178c79ca85bba7c6c13f59cfae4d2a72d567c1eaebb05d4bfa5e8b8b67b1eeed6894d27f252e57b53c29ce1b8d4498dc0b440f418011703a58698a7c5e6fe02109b0e2c3f03bf7528cf3", 0xc0}, {&(0x7f0000000780)="a543026edf32ac1d4c0e06964cfce9c02a7beb982c42aad9dbbc3b0aa26ca277f217e93c64866c376292f467aeb01cf326d12b97a73a4bfc3d1eaf51d6092004d4cb34ab4748eafb338042ffcef9f0a1a8053711638f77d38854efa6d44ab270502114fd35c3e7f7b570de91f06d722d301f69304c553a56ef556bf03a88569afb8128bbd21e344805b3f810d78743750dfea512ac2872be477fb51792ca76d03c80e4c5f3ce8be39c31e4ab476f8ff28bfb5d468e4c0879b15099501d7c622bf2cbc83085c8a6388aa4200cd811e174f42f20a92b3688", 0xd7}, {&(0x7f0000000880)="9d772e5338c209426566b7d2af44255db5ff5a2482501ce38e60013bcf99a53ab3f7736f9598a3337717789e49a3d732eec45d8d0fdd0ab121892e22fbfa5f9ad3018fc656471d2bfa5b0f606f25d881e987660a6762a57b799c8ba43f23540f321c3391105284da5cef1fb3d9bf9daeefec64d9fb0843fce0cf4a269cdf73899d9cdb08d5de4c5969a3aa7b5a560b", 0x8f}, {&(0x7f0000000940)="ece654ab921aba2bbabc103e5cb3d0390312550d96cbb1e15e20d9aee9ada7b27d2ef24935995fd26fab555c32b28bb8a2b46146cbb163aa7aff4ba7c343dea9489c626977feb7c9cf49f0733d99d4da7caedfcad82713708d4202494ed0fc676bd2bab81615527a3a9c1fdaf5288102df1e67a68050276f3759d772b681202dce3036815955670a74c28030feea2901c480179167bd164d4b94f2a5ed19f8c5986d962e68c34a03904224", 0xab}], 0x8, 0x9) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 737.828543] audit: type=1400 audit(1556724860.747:14513): avc: denied { map } for pid=21652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:20 executing program 2: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) r0 = socket(0x100000000a, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000080)=@default) sendto$inet(r0, 0x0, 0xc8, 0x0, 0x0, 0x2d7) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1, 0x3}, &(0x7f00000001c0)=0x8) r2 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) [ 737.924941] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 737.968916] audit: type=1400 audit(1556724860.777:14514): avc: denied { getrlimit } for pid=21646 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 15:34:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x3, 0x8000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xe234, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x3, 0x2) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f00000002c0)=r3) r4 = socket$inet(0x10, 0x3, 0x40000000000010) sendmsg(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="240000001d0003fffd3cc0023da2830101faffffff86c436271d8568b51ba3a2d188737e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0xe, 0x0}}], 0x88, 0x2, 0x0) getpeername(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000040)=0x80) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x68, r6, 0x300, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xdf46, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x1) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee1, &(0x7f0000000200)={0x0, 0x0, 0x1, &(0x7f00000001c0)=0x1000}) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000640)={0x80, 0x20, &(0x7f0000000540)="20c49b7c1d9330d481d81cf3dc6bfcb984d74b4de05766e86c06a21f551e2a4a90302531a3fe71c57ace827e37d59968a9688f693e36724097e026bf1bda04418bc328425b79368f23380df15bb3a2d7f3ec114f71e902219cf3c7fc4f4622010250dde71ff654417331f6c4f9c90e8399a5a7be2bc023e04bfb16b48658041f61cb4b127a2a005423d201185d4b12192f744495e8f9d0a146ff783e5020e45943ea73b70bbea3fc2ab71c02f40489a29ad6743f6faa2da6b154cd1fe0692a174992889b652d33ea552d63dee8f1f2fa9042790cb438ec", {0x9, 0x8, 0x7f777f7b, 0x7, 0xffffffffffffffff, 0x9, 0x7, 0xf465}}) [ 738.131161] audit: type=1400 audit(1556724860.837:14515): avc: denied { map } for pid=21652 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/51, 0x33) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc000000003f319bd070") fcntl$getownex(r1, 0x10, &(0x7f00000003c0)) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/arp\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r3, 0x0, 0x8, &(0x7f00000002c0)='-nodev+\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(r1, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r5 = getpgrp(r4) syz_open_procfs(r5, &(0x7f0000000280)='net/ip_tables_names\x00') ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000080)={{0x1, 0x8001, 0x8000, 0x7fff, 0x2, 0xffffffff}, 0x1, 0x3, 0x0, 0x7, 0xe3, "2e0dc3024d028312745f770490a5e8907fc2140386d4f39e788f3744aa6c9b2d675dca988a82ea9f4d1ead166f8e2df2cd0c8ccf39c7cc4db34dcd673d46df52d46dd2f61ff5b72159e8d18c76cf14fbd077b4bd6e1ba0e542f86a4b2696f94c7d12be17cf150a2768624fa4b404d84c68b12fc2191ad75a2890808324f0763a"}) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) [ 738.302237] audit: type=1400 audit(1556724860.837:14516): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="fdce1565cc9b4a65140adc19f5dd08d1eac57ea8e95dd9b9933bb13a48be22fc52c7ada9899876f86cb32fb5977b3b7bc982cb3b") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x0]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0x200}, 0x8) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x2, 0x4) [ 738.497105] audit: type=1400 audit(1556724860.837:14517): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.676436] audit: type=1400 audit(1556724860.917:14518): avc: denied { map } for pid=21652 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.880164] audit: type=1400 audit(1556724860.947:14519): avc: denied { map } for pid=21652 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:21 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x4000000000001}, 0x2) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x0, @rand_addr="ecc0accb5ed80302d97af1e2b57a9d15", 0x3}}}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000280)={0xffffffffffffffff}, 0x0, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x11}, 0x9}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0), r1}}, 0x18) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_cache\x00') write$P9_RWALK(r3, &(0x7f0000000100)={0x3d, 0x6f, 0x2, {0x4, [{0x0, 0x3, 0x6}, {0x0, 0x2, 0x3}, {0x24, 0x3, 0x4}, {0x2, 0x4, 0x3}]}}, 0x3d) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180), 0x2) 15:34:21 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={r5, 0x8}, &(0x7f0000000180)=0x8) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="020e0000000000001b000080ff030000faffffff0b000000f8729d0000000000010000400600000003000000a51700002400000000000000"]) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:21 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0xc, &(0x7f0000000180)=',vboxnet1/\'\x00'}, 0x30) syz_open_procfs(r2, &(0x7f0000000200)='net/snmp6\x00') ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:22 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000002ec0)) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, &(0x7f0000000240)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000900)='IPVS\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000280)=0xe8) getegid() ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000a80)={0x52}) getgroups(0x7, &(0x7f00000007c0)=[0xee00, 0x0, 0xee00, 0xee00, 0x0, 0xee00, 0xee01]) fstat(0xffffffffffffff9c, &(0x7f0000000880)) getgroups(0x5, &(0x7f0000000980)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xee00]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000940)='./bus\x00', 0x0, 0x109) fchdir(r2) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000000006e041c7700fdff863809aa0063b8f24252b1d85cbf1d0000000038f70f653f0ffb09f0d536b564df5e0a9efd50fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b98d585cebd96033ccfdff0664cf"], 0x56) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./bus\x00') sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) 15:34:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000001e80)={0x5, 0x10, 0xfa00, {&(0x7f0000001c00), r8, 0x1}}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) process_vm_readv(r4, &(0x7f00000009c0)=[{&(0x7f00000005c0)=""/71, 0x47}, {&(0x7f0000000640)=""/37, 0x25}, {&(0x7f0000000680)=""/184, 0xb8}, {&(0x7f0000000740)=""/171, 0xab}, {&(0x7f0000000800)=""/139, 0x8b}, {&(0x7f00000008c0)=""/125, 0x7d}, {&(0x7f0000000940)=""/88, 0x58}], 0x7, &(0x7f0000001bc0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/183, 0xb7}, {&(0x7f0000001b00)=""/173, 0xad}], 0x3, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) 15:34:22 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000240)=""/133, &(0x7f00000001c0)=0x85) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @host}, 0xf) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000180)) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000440)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r2}) syz_execute_func(&(0x7f0000000000)="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") [ 739.797889] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=63621 sclass=netlink_tcpdiag_socket pig=21703 comm=syz-executor.0 15:34:22 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000140)={r3, 0x800}, 0x8) r4 = dup3(0xffffffffffffffff, r1, 0xfffffffffffffffd) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000100)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x0, 0x0, 0xffffffdd}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}, 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @mcast1, 0x66}, r2}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000040000000000000000000000000000000000000000000000009ce9a679fb701f44080000f553b94c14ed224dc1979348d7a086d2a01a8b8c681f1258e62321e94aad7325b76db6bbb33967c0d5e96838dff61e00fed07b55dfc6ac5554e066cc86a4a19deee1cc1753275db3023d77eccc89af960175e0e0d4390ebb2629486b750961ad03ba4518b7dc3c2dbd6d866d7006290a7e732b9c"], 0x28) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000180)) getgroups(0x5, &(0x7f0000000080)=[0xee00, 0xee00, 0xee00, 0xee00, 0x0]) setfsgid(r1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000200)={0x781, {{0x2, 0x4e21, @multicast2}}}, 0x88) preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) 15:34:23 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)={0x0, 0x0, 0x61a}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000001c0)={r2}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:23 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f00000000c0)=0x40) pread64(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:24 executing program 2: open(0x0, 0x1000000000608220, 0xffffffffffff7ffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000500)="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") 15:34:24 executing program 1: mkdir(&(0x7f0000000140)='./file1\x00', 0x800) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757070657200000000800100006c65302c6c6f7765726469723d2e2f66696c02fff6776f23b2660f726b6269723d2e2f66696c"]) creat(&(0x7f0000000080)='./file1\x00', 0x4) 15:34:24 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r0, &(0x7f00000027c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/86, 0x56}], 0x1, &(0x7f0000000140)=""/246, 0xf6}, 0x8}, {{&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/63, 0x3f}, {&(0x7f0000000300)=""/24, 0x18}, {&(0x7f0000000480)=""/131, 0x83}], 0x3, &(0x7f0000000580)=""/13, 0xd}, 0x80000001}, {{&(0x7f00000005c0)=@ipx, 0x80, &(0x7f0000000740)=[{&(0x7f0000000640)=""/215, 0xd7}], 0x1, &(0x7f0000002c40)=""/43, 0x2b}, 0x7}, {{&(0x7f00000007c0)=@nl=@proc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000840)=""/45, 0x2d}, {&(0x7f0000000880)=""/166, 0xa6}, {&(0x7f0000000940)=""/25, 0x19}, {&(0x7f0000000980)=""/184, 0xb8}, {&(0x7f0000000a40)=""/68, 0x44}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000001ac0)}, {&(0x7f0000001b00)=""/91, 0x5b}, {&(0x7f0000001b80)=""/220, 0xfffffffffffffeae}], 0x9, 0x0, 0x2dd}, 0x7}, {{&(0x7f0000001d40)=@nfc, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001dc0)=""/89, 0x59}, {&(0x7f0000001e40)=""/91, 0x5b}, {&(0x7f0000001ec0)}, {&(0x7f0000001f00)=""/190, 0xbe}], 0x4, &(0x7f0000002000)=""/226, 0xe2}, 0x8}, {{&(0x7f0000002100)=@nfc_llcp, 0x80, &(0x7f0000002180)=[{&(0x7f0000003180)=""/4096, 0x1000}], 0x1, &(0x7f00000021c0)=""/135, 0x87}, 0x2}, {{&(0x7f0000002280)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002300)=""/163, 0xa3}, {&(0x7f00000023c0)=""/99, 0x63}, {&(0x7f0000002440)=""/182, 0xb6}, {&(0x7f0000002500)=""/5, 0x5}, {&(0x7f0000002540)=""/181, 0xb5}, {&(0x7f0000002600)=""/190, 0xbe}], 0x6, &(0x7f0000002740)=""/117, 0x75}}], 0x7, 0x40, &(0x7f0000002980)={0x0, 0x1c9c380}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x99d1, 0x5, 0x8000, 0x4, 0x2}, &(0x7f0000002b80)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000002bc0)={0x4, 0x5, 0x4, 0x3, 0x7, 0x5, 0x9, 0x6, r3}, &(0x7f0000002c00)=0x20) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000001ac0)) getsockopt$sock_buf(r2, 0x1, 0x37, &(0x7f00000029c0)=""/217, &(0x7f0000001ec0)=0xd9) [ 741.406505] QAT: Invalid ioctl 15:34:24 executing program 3: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:24 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x400000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x4, @dev={[], 0x2b}, 'eql\x00'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3179d070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f0000000280)=0x14) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'bpq0\x00', r3}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xfffffffffffffeff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r4, 0x7f}, &(0x7f0000000200)=0x8) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:25 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 742.313265] kauditd_printk_skb: 174 callbacks suppressed [ 742.313274] audit: type=1400 audit(1556724865.237:14694): avc: denied { map } for pid=21754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 742.436950] audit: type=1400 audit(1556724865.267:14695): avc: denied { map } for pid=21754 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x100) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) lstat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = epoll_create1(0x0) fcntl$lock(r5, 0x100000000000007, &(0x7f0000000100)={0x0, 0x0, 0x7fffffffffffffff, 0x3ff}) keyctl$chown(0x4, r2, r3, r4) syz_emit_ethernet(0x0, 0x0, 0x0) [ 742.579403] audit: type=1400 audit(1556724865.287:14696): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 742.790135] protocol 88fb is buggy, dev hsr_slave_0 [ 742.795373] protocol 88fb is buggy, dev hsr_slave_1 [ 742.820210] audit: type=1400 audit(1556724865.297:14697): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f0000001300)=[{&(0x7f0000000080)=""/84, 0x54}, {&(0x7f0000000200)=""/4096, 0xfffffee5}, {&(0x7f0000000100)=""/168, 0xa8}, {&(0x7f0000001200)=""/123, 0x7b}, {&(0x7f0000001280)=""/107, 0x6b}], 0x5, 0x700) [ 742.930183] audit: type=1400 audit(1556724865.317:14698): avc: denied { map } for pid=21754 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:25 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x10000000, 0x402) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000380)={@hci={0x1f, r2, 0x3}, {&(0x7f00000001c0)=""/123, 0x7b}, &(0x7f0000000240)}, 0xa0) syz_execute_func(&(0x7f0000000000)="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") syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 743.084798] audit: type=1400 audit(1556724865.337:14699): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.270178] protocol 88fb is buggy, dev hsr_slave_0 [ 743.275587] protocol 88fb is buggy, dev hsr_slave_1 15:34:26 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(r2, 0x0, &(0x7f0000000380), 0x80800) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000040)=0x1c) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000000c0)={{0x3, 0x0, 0x1ff, 0x1, 0x9}}) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 743.316021] audit: type=1400 audit(1556724865.337:14700): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r2, 0x3d, "f2e47c", "f292a2857ca380ce100e23b601546a968295030a28d49d76b755381352972172fbba9f3a78af57c1cb859970e11aed11d3897ef503871855945b635f72f13f444254682b5724400154eca6f1701b33fe29b45a475da2f5b20567f0be467928861a154917ec1d9d40bedde5de6dbf7ecd5cdaed77cf517e6258adac2d829705b8a707b86488592a9acf0bfe5abbf77de6912d09bc6a91d03eca416594f6ceddda468da9ebecbc8552166e41e7b0d24308a59aa8fb3e815e9aa476c39235edef7cf5fe861ac6c4dd7bf9b15bc0d26fc82c02f66193ba9c8c0794d363ec5c91688d857cedb5905a0afda259b001e3425003d42899881614ea5289e453f54577c99c"}}, 0x110) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, @in={{0x2, 0x4e20, @loopback}}, 0x7, 0xff, 0x3, 0xffffffff, 0x61977940}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x7}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) [ 743.582629] audit: type=1400 audit(1556724865.387:14701): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.729020] audit: type=1400 audit(1556724865.407:14702): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='mime_type\x00', 0xfffffffffffffffb) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8000, 0x400) r2 = gettid() fremovexattr(r1, &(0x7f0000000280)=@known='system.posix_acl_default\x00') write$cgroup_pid(r1, &(0x7f0000000180)=r2, 0x12) keyctl$clear(0x7, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1be, 0x700) lsetxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:clock_device_t:s0\x00', 0x24, 0x3) socket$pptp(0x18, 0x1, 0x2) 15:34:26 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") finit_module(r1, &(0x7f0000000000)='/dev/usbmon#\x00', 0x2) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f00000001c0)=0x3, 0x971ae9559893abbe) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) [ 743.942277] audit: type=1400 audit(1556724865.457:14704): avc: denied { map } for pid=21754 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, &(0x7f0000000040)=0x7, &(0x7f00000000c0)=0x1) move_pages(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffc000/0x2000)=nil], 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x4, 0x4, 0x40, 0x0, r0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000140)={0xf, 0x102, 0x6, {0x5, 0x1, 0x3b3, 0x2}}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f00000000c0)}, 0x10) 15:34:27 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x100, 0x801) getresuid(&(0x7f0000001600), &(0x7f0000001640), &(0x7f0000001680)=0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@default, @null, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x5, &(0x7f0000001580)=[{&(0x7f0000000480)="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", 0x1000, 0x7}, {&(0x7f0000000200)="32fa8041ac4112b769d6065a555a1d9d96728a0ff8", 0x15, 0xff}, {&(0x7f0000000240)="fdc1da8da0ab125c4532727a12763640cb68f43fb825db5fe69fee67f4f05138204d5e614490e4b873182dfad2007aa75cbe98720f3ba5f1118e5018faa9cc5f528d670b5681da27f93ed2209b8286362a67dacb13562232ad5afb91ad08c661a62ea0da7a95594fdfe924e4c6cbda546810bd682bf934704f4aa4eb3d7fbfa679b47157bddc6234d93b880e8decd05125f00d22bd97e9da877bbee9dbc1d3d14321569c62a51d730272c246bd7193cfcc127a41230ae1dfa4", 0xb9, 0x9}, {&(0x7f0000000300)="94853d562fbbb50b58646c", 0xb, 0x9}, {&(0x7f0000001480)="459dd067fce65c7cb284041fe54ba703588d86869cf56dc91eb3363650b7b8222855287b4119882405775cf433022964a9b04c0a30e057e0fe1a50ff7aa4030820340b945496dcc43b3e00a974cab7fc87dcb9adc47c37d2464a99e59af69b1ad34c0b8a4e670a7dbd1e5da359c30bec0e36e4fda778086b96880b1922b5735006f2c85485ad4d051f320184ac2f65dbcc85468f5693c61f99d0d0e823b816c0475f62dae1786fc946d97ad8a4216a2794cc0ecddfc72680ea50615dd120b4f648e0e996f47e9ea6dad35bc843c16843", 0xd0}], 0x2080, &(0x7f00000016c0)=ANY=[@ANYBLOB='errors=remount-ro,smackfsroot=\\}trustedem1+,fowner=', @ANYRESDEC=r1, @ANYBLOB="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"]) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f31ea4fc1") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, @in={{0x2, 0x4e20, @loopback}}, 0x7, 0xff, 0x3, 0xffffffff, 0x61977940}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r3, 0x7}, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) 15:34:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:27 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008913, &(0x7f0000000300)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="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") getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x200, 0xfff, 0x100000001, 0x0, 0x8, 0x4, 0x5, {0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x401, 0x5, 0xfff, 0x9478, 0xfffffffffffffe00}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000002c0)={r2, 0x5}, 0x8) 15:34:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101400, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x7}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f00000000c0)={0x3, 0xfff, 0x3, 0x5}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff, 0xffffffffffffffff}, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r3, 0x80000000}, 0x8) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000280)={0xfffffffffffffffd, "995d071254a4357ba2f0ec735caf17f0ca12e550548e0ff4c070315b1f389915", 0x1, 0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) r5 = syz_open_procfs(r4, &(0x7f00000005c0)='net/snmp\x00') preadv(r5, &(0x7f00000017c0), 0x1be, 0x700) 15:34:28 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x955932b0819e30d3, 0x0) socket$pptp(0x18, 0x1, 0x2) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x3, 0x20040) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000200)=@sco, 0x0, &(0x7f0000000500)=[{&(0x7f0000000180)=""/7}, {&(0x7f0000000280)=""/86}, {&(0x7f0000000300)=""/91}, {&(0x7f0000000380)=""/251}, {&(0x7f0000000480)=""/119}], 0x0, &(0x7f0000000580)=""/202}, 0xb9}, {{&(0x7f0000000680)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000700)=""/130}, {&(0x7f00000007c0)=""/4096}], 0x0, &(0x7f0000001800)=""/107}, 0x5}, {{&(0x7f0000001880)=@nfc, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001900)=""/39}, {&(0x7f0000001940)=""/228}, {&(0x7f0000001a40)=""/228}, {&(0x7f0000001b40)=""/245}, {&(0x7f0000001c40)=""/120}, {&(0x7f0000001cc0)=""/63}, {&(0x7f0000001d00)=""/117}, {&(0x7f0000001d80)=""/139}]}, 0x7}, {{&(0x7f0000001ec0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast1}}, 0x0, &(0x7f0000002280)=[{&(0x7f0000002fc0)=""/12}, {&(0x7f0000001f80)=""/112}, {&(0x7f0000002000)=""/75}, {&(0x7f0000002080)=""/241}, {&(0x7f0000002180)=""/251}], 0x0, &(0x7f0000002300)=""/120}, 0x820}, {{&(0x7f0000002380)=@alg, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002400)=""/23}, {&(0x7f0000002440)=""/71}, {&(0x7f0000003180)=""/4096}, {&(0x7f00000024c0)=""/11}, {&(0x7f0000004180)=""/4096}, {&(0x7f0000002f80)=""/48}, {&(0x7f0000002540)=""/92}], 0x0, &(0x7f0000002640)=""/252}, 0x10000}, {{&(0x7f0000002740)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x0, &(0x7f0000002a40)=[{&(0x7f00000027c0)=""/24}, {&(0x7f0000002800)=""/245}, {&(0x7f0000002900)=""/252}, {&(0x7f0000002a00)=""/62}], 0x0, &(0x7f0000002a80)=""/195, 0xfffffd72}, 0x144}, {{0x0, 0x0, &(0x7f0000002b80), 0x0, &(0x7f0000002bc0)=""/55}, 0x8}, {{&(0x7f0000002c00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000002d00)=[{&(0x7f0000002c80)=""/76}], 0x0, &(0x7f0000002d40)=""/12}}], 0x40000000000034e, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') write$FUSE_POLL(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x3, {0x8}}, 0x18) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = dup3(0xffffffffffffffff, r0, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000040)=0x8) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in=@dev, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x400, &(0x7f0000000600)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@uid_gt={'uid>', r7}}, {@obj_user={'obj_user', 0x3d, 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}]}}) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r8 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000002c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) mount$9p_tcp(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x148000, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e22,version=9p2000.L,cachetag=.wlan1ppp0proc+,cache=none,subj_role=($,defcontext=unconfined_u,measure,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c646f6e745f61707072616973652c61707072616973652c00ee66f9563b2bb2eb569d64fda707e485efb29e6f14c60d4bcf1ce0455cfd"]) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f00000006c0)={0x2, 0xa71, &(0x7f0000000540)="1ca6b175e11c362e22d1e2c83965893151d13bb4d42c118bc336ee49c9ab0615f8d5b84b6cdbc331b1c5198101e3c5f67b0621ed367880a02724c36b4bddf8ddee644f6ce3bd5943b7bef1ab51fce5833ef4c9e32087df20a296e9e9cf5581b54c69bb86b848af12df75da8158ef5d4c477a25", &(0x7f00000005c0)="61e474a75c520ca17bfdf47f2647a23b600ee5c366978588a4dc1f20e036aa3503e9fbc19df78a787d78f3de47aff38b1acb21b3f024ae72b53ccfe949c43a50cf399c23ef61bde015ecbfa2eff692f94b9c5e9be98f7c88e2b696f55ca4d872028bc3fd78b73948d2a5eb2cdaa1a95749e802e598484c6dbdbad74daf804fa379026b58bd603e7f5471d8f40359b984642d9a86a687aded26b5844e884a4aba2324e2fcdf88d1d0a14bc307fee9410468893dc68e2ffa90bdd8580d2f228b706c98f17359bf8d06c4", 0x73, 0xc9}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000004c0)={0x3, 0x1, 0x66ba7018, 0x25cf, &(0x7f0000000480)=[{}]}) syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000003c0)={0x8, 0x2, {0x3, 0x2, 0x9, 0x54079b7ca18b55dc, 0x1}}) 15:34:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x101200, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB="b40200001400260326bd7000fedbdf25fe8000000000000000000000000000aaff0100000000000000000000000000014e2100004e21a53f0200a0a07f000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="ba6b6e0001000000fc0012006165676973323536000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070050000600000004f1addef78e695894708f22044c71c4539db6936dd6256b44ccd6f3c28db81b6e1064b6b776eb690dc2fac357b1d0527f18e8bbe6e00d03047444681952e494bf0f7333996f7a19f6a8cf2d1d506b84cdb5479b0e927125f3bb6fdf3c42289742d50e4e29fcd11271235d4baa91a2e4c88805ba509ad56cbc796e5d23c5a7e515aada6a3b151c9740e4c00c179aabe667a7476b35fb067fec91cd1b9475a9200002400090069020000000000000900000000000000000000000000000008000000000000003c01020063626328636173743629000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000880700003a56a6fab69f7eeadb9eba1d64c8b8e0818b3ebf9177ec15a052ab4d2c50fdda5df42061c0f0cfda20b505235c7d3cbcb68ff52eb218d287a16d5ffb87ab86022bc0f1c6eee416879ab893ccecf22a8d685c4e4872401eaf62a2934c9c9b77485368f2e00a68677eb7fe3f9a4c58e6e9812c618f284d5c9d0c0598cc39ab3c8addf1768db447cfc13aa3937f7732cab0e72112572cd1eabd5840b5b46494b5303ab4d800ae6f8f617fac1e0f139c2dcfb0e433bd916d4f57acb2fd20b63725f1fcd8cbe28ae1852481f72bf61801442cff8ba1a7caa965f20139959f18303f6dc6f5ea6a033eedcaf43babe314da6f296700000008001d000000000000000000000000000000000000000006775ff0de56c2dee61332f9a691a18e6ebc95834a8640d1f5c2e1def516cdcadfc739360d8d23b4de5dce86b062aeac3813996d372b75ddb776f69aaded8916024df7"], 0x2b4}, 0x1, 0x0, 0x0, 0x1}, 0x4) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) 15:34:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x6f, &(0x7f0000000140)=""/172, &(0x7f0000000040)=0xac) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000080)={0x6, 0x2, 0xa798, 0x100, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={r3, 0x7f}, &(0x7f0000000200)=0x8) close(r2) close(r1) 15:34:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x60, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x28}}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r2, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = dup3(r2, r3, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r5, r5) ioctl$NBD_DO_IT(r6, 0xab03) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0xca102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:30 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x40, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x101) ioctl(r0, 0xfffffffffffffff9, &(0x7f00000000c0)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) [ 747.440558] protocol 88fb is buggy, dev hsr_slave_0 [ 747.446306] protocol 88fb is buggy, dev hsr_slave_1 [ 747.452372] kauditd_printk_skb: 208 callbacks suppressed [ 747.452381] audit: type=1400 audit(1556724870.367:14912): avc: denied { map } for pid=21883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:30 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0xffffffffffffffbc, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='lapb0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000000c0)={0x2, 0x26, 0x6}) r5 = dup2(r1, r4) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x2) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0x0, 0x2c0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 747.662234] audit: type=1400 audit(1556724870.367:14913): avc: denied { map } for pid=21883 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 747.684721] protocol 88fb is buggy, dev hsr_slave_0 [ 747.684783] protocol 88fb is buggy, dev hsr_slave_1 15:34:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="05001f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800200003804000019000300e60100006c000000000000000100000001000000000100000040000080000000000000006d5ebe5a0000ffff53ef", 0xffffff96, 0x400}], 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x212) connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000001c0)={{0x96, 0x4}, 'port0\x00', 0x25, 0x80051, 0x1, 0x6, 0x9, 0x7f, 0x30, 0x0, 0x6, 0x367}) 15:34:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000180)=0x8000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) capset(&(0x7f0000000200)={0x20071026, r2}, &(0x7f0000000240)={0xa3, 0x401, 0x8, 0x4, 0x5, 0xfff}) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$SIOCNRDECOBS(r0, 0x89e2) syz_execute_func(&(0x7f0000000000)="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") 15:34:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f00000000c0)="ba16ba02bf27f330871b7e546fe59c24d800000003224544d16af217b1b438edc372766f8abd706ff01860392f29047770990602911b1a9e42f60ce58ddca1000000000000000000") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f00000000c0)=0xc) wait4(r2, &(0x7f0000000100), 0x0, &(0x7f0000000200)) [ 748.453714] audit: type=1400 audit(1556724870.457:14917): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:31 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='team0\x00', 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) [ 748.646559] audit: type=1400 audit(1556724870.467:14918): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:31 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, r2, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1e93}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcad}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_execute_func(&(0x7f0000000000)="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") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000002c0)={@mcast2, r3}, 0x14) [ 748.805422] audit: type=1400 audit(1556724870.507:14919): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.926845] audit: type=1400 audit(1556724870.517:14920): avc: denied { map } for pid=21883 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:32 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x40000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x30d) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000100)={0x0, 0x1, [0x3, 0x0, 0x1f, 0x2, 0x8, 0x10001, 0x1, 0xe359]}) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) setsockopt(r0, 0x10000800000010d, 0x2, &(0x7f0000000ff8)="fffffff40100ffff", 0x8) [ 749.075618] audit: audit_backlog=65 > audit_backlog_limit=64 15:34:32 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x81, 0x101000) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x3, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x4}, 'port1\x00', 0x4, 0x0, 0x1, 0xffff, 0x6, 0x7, 0xe0, 0x0, 0x3, 0x3}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r3, &(0x7f00000017c0), 0x1be, 0x700) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') 15:34:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = eventfd2(0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f00000006c0), 0xfffffea1) dup3(r2, r1, 0x0) r3 = gettid() tkill(r3, 0x19) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") 15:34:32 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x204, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, [""]}, 0x24}}, 0x48000) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f00000001c0)=0x3) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r5 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:32 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x4000000020000, 0x101083) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RCLUNK(r0, &(0x7f00000001c0)={0x7, 0x79, 0x2}, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000180)=0x1) syz_execute_func(&(0x7f0000000000)="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") r2 = socket$kcm(0x29, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000200)=[{r1, 0x110}, {r0, 0xa100}, {r0, 0x22}, {r1, 0x8104}, {r0, 0x100}, {r0, 0x2000}, {r0, 0x400}, {r2, 0x8020}], 0x8, &(0x7f0000000280)={r3, r4+10000000}, &(0x7f00000002c0)={0xff}, 0x8) 15:34:32 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x181400, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0xaa, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000540)={0x9e0000, 0x2, 0x5, [], &(0x7f0000000600)={0x990b6e, 0x2eae, [], @value64=0x2}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="000000400e000000000000") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f00000000c0)=0xc) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000480)={0x6, 0x6}) prctl$PR_GET_SECUREBITS(0x1b) fsetxattr$security_smack_entry(r1, &(0x7f00000002c0)='security.SMACK64MMAP\x00', &(0x7f0000000300)='\x00', 0x1, 0x1) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000180)='\x00', 0x1) ptrace$peekuser(0x3, r3, 0x400000000005) write$FUSE_LK(r0, &(0x7f0000000500)={0x28, 0x0, 0x1, {{0xdfe0, 0x8, 0x2, r3}}}, 0x28) preadv(r2, &(0x7f00000017c0), 0x1be, 0x700) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f00000004c0)={r0, 0x0, 0x0, 0x20, 0x432128cc}) 15:34:32 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) wait4(r0, 0x0, 0xe, 0x0) r1 = gettid() r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) setuid(0xee01) tkill(r1, 0x1000000000012) 15:34:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000001c0)="64d848000f019f4182d22b430f00dc6566400f38807bf266ba400066edb9800000c00f3235004000000f300f23ff66baf80cb8b503f382ef66bafc0cec66b867008ec066b8aa008ed0", 0x49}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000480)="0adc1f123c123f319bd070") ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e22, @broadcast}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:34:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:33 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x80000001, 0x801) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f00000000c0)=0x2, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000480)={{0x7, 0x6, 0x1ff, 0x725877aa, '\x00', 0x9b1e}, 0x0, 0x7, 0x54, r5, 0xa, 0xa762, 'syz1\x00', &(0x7f0000000100)=['\x00', '/proc/thread-self/attr/current\x00', 'trusted\xbewlan1\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', '/wlan1,$\x00', '\x00', 'em0-vboxnet0-,!4ppp0!md5sum]\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', '/proc/thread-self/attr/current\x00'], 0xa4, [], [0x7, 0xfffffffffffffffd, 0x3, 0xc]}) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r6 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:33 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000100)=""/226, 0xe2}, {&(0x7f0000000200)=""/172, 0xac}, {&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f0000000680)=""/169, 0xa9}, {&(0x7f0000000480)=""/216, 0xd8}, {&(0x7f00000003c0)=""/101, 0x65}], 0x6, 0x700) 15:34:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x10000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000180)={0x1, 0x4, 0x0, 0x5, r4}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000000c0)={0xff, @multicast1, 0x4e20, 0x1, 'dh\x00', 0x5, 0x8000000007f}, 0x2c) 15:34:34 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80000) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000300)=0x5) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @empty, 0x1ff}, {0xa, 0x4e21, 0x8, @local, 0x200}, r2, 0x3}}, 0x48) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x20b) ioctl(r3, 0x8ce1, &(0x7f0000000180)="0adc1f123c123f319bd070") getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) syz_execute_func(&(0x7f0000000000)="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") write$selinux_user(r1, &(0x7f0000000240)={'system_u:object_r:hwdata_t:s0', 0x20, 'sysadm_u\x00'}, 0x27) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'bcsh0\x00', 0x200}) [ 752.080667] net_ratelimit: 20 callbacks suppressed [ 752.080714] protocol 88fb is buggy, dev hsr_slave_0 [ 752.091568] protocol 88fb is buggy, dev hsr_slave_1 15:34:35 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) sendto$inet(r3, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = dup2(r3, r3) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x200000004, 0xfffffffffffffff9, 0x8000000000006}) 15:34:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x9) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000080)={0x0, 0x20343059, 0x3, @stepwise={0x4, 0x7, 0xd6d, 0x7, 0x100000000, 0x80000001}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000005c0)) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000001c0)={[{0x8}]}) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f0000000000)) [ 752.230131] protocol 88fb is buggy, dev hsr_slave_0 [ 752.235424] protocol 88fb is buggy, dev hsr_slave_1 [ 752.310435] protocol 88fb is buggy, dev hsr_slave_0 [ 752.315639] protocol 88fb is buggy, dev hsr_slave_1 15:34:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000480)={{0x0, 0x5, 0x7ff, 0x5, '\x00', 0x200}, 0x0, [0x100, 0x3, 0x9, 0x7, 0x4, 0x80000000, 0x3, 0x0, 0x800, 0x2, 0x5, 0x530, 0x8001, 0x7, 0x0, 0x80000001, 0x3, 0x0, 0x1, 0x8f, 0x52f1, 0x1, 0x8, 0x10000, 0x2, 0x8, 0x0, 0xd90d, 0xfffffffffffffff8, 0xffff, 0x1, 0x1, 0x1e, 0x1, 0x7fffffff, 0x3, 0x9, 0x0, 0x1ff, 0x0, 0x7fff, 0xfffffffffffff801, 0x800, 0x0, 0x1, 0x7, 0x2, 0x7, 0x2, 0x1, 0x3, 0x9, 0x9, 0x6, 0x8, 0x800, 0x0, 0x80000001, 0x5, 0x2, 0x72c, 0x6, 0x48, 0x3, 0x6, 0x10001, 0x4, 0x8, 0x4, 0x4, 0x4, 0x9, 0x1, 0x1, 0x2, 0x401, 0x8, 0x2, 0x7, 0x3ff, 0x0, 0x20, 0x7fffffff, 0x5, 0x3, 0x5, 0x1, 0x4, 0x9, 0xcd68, 0x2, 0x4, 0x7, 0x3, 0x5, 0x0, 0x444e, 0xfffffffffffffffd, 0x200, 0xfffffffffffffffd, 0xa5, 0xff, 0x7ff, 0x7, 0x2, 0x7fffffff, 0x10001, 0xcb, 0x8, 0x6, 0x91, 0x0, 0x9, 0xe46b, 0x6a, 0x7, 0x2472, 0x8, 0x100000001, 0x255, 0xed, 0x10001, 0x59, 0x8, 0x7a, 0x1, 0x1, 0x1ff], {r2, r3+10000000}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000001c0)=r1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000280)={0x78, "3a6a9a84d4c12134bb812e21b591ff33335e818394630ff2a8577d315ae6244380f10be084ba70a61416b6d5e1e102a6224cdd31d4ce77c0c658e111ee1ed55b33ef4e5883558bc26052ce25e00202f36b0a345b8d59036f0c228e268fe0193d40874993b562879fc6b0c5460bc5951dea57127afe2895369bc4ae3cdd58ab5a"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") [ 752.512308] kauditd_printk_skb: 230 callbacks suppressed [ 752.512317] audit: type=1400 audit(1556724875.437:15149): avc: denied { map } for pid=22010 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:35 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000340)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x14], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3]}, @mcast2}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/arp\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) [ 752.772660] audit: type=1400 audit(1556724875.437:15150): avc: denied { map } for pid=22001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 752.912834] audit: type=1400 audit(1556724875.437:15151): avc: denied { map } for pid=22001 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1c) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0ad401003c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xd) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000180)="9aef294015f48e317f69e7110e83fa27dbd4578410434c7efd3a357c9a7ef219f858be9001f6f8ba040961abdddbb8689509197da76c6299dca2759494c965290af2743b8e311ac817611c543d9717fc1edbde3c143c3f76203fd4d21f3a89627305a466623035f3e6254bd8246aa9098f8b8e548e17a632c2c8123dba956af215ab50fbdf04675e9b4ed3b25ae8769bf2982bb9b2daf942d8eb005957a2658e61aeaeac5e6e17e2095fbc323e1fc4a2a5964602694cbcde4a89ef6b85454af43abb990074c67baaabd3d051ce427c299291ef4e31e1fb9957d90e3cd83d") ioctl$TCSETS(r1, 0x5412, &(0x7f0000000140)) ioctl$FIONREAD(r1, 0x5437, 0x0) [ 753.127253] audit: type=1400 audit(1556724875.467:15152): avc: denied { map } for pid=22010 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.190125] protocol 88fb is buggy, dev hsr_slave_0 [ 753.195382] protocol 88fb is buggy, dev hsr_slave_1 15:34:36 executing program 3: accept4(0xffffffffffffff9c, &(0x7f0000000180)=@generic, &(0x7f0000000200)=0x80, 0x800) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000240)=0xf1e, 0x4) 15:34:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c163f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff, r1, 0x0, 0x140, &(0x7f0000000680)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x0}) write$sndseq(r2, &(0x7f0000000300)=[{0x3, 0x7, 0x4, 0x0, @time={0x0, 0x1c9c380}, {0xcb00000000000000, 0x6}, {0x1}, @result={0x800, 0x3ff}}, {0xff, 0x400, 0x4, 0xb4d2, @time={0x77359400}, {0x3, 0x8001}, {0x0, 0x6}, @time=@time={0x77359400}}, {0x8, 0x10000, 0x8000, 0x8, @tick=0x6, {0x1, 0x80000000}, {0x0, 0x52a}, @result={0x1f, 0x200}}, {0x5, 0x81, 0x4, 0x5, @time={0x77359400}, {0x100000001, 0x26}, {0xfffffffffffffffd, 0xfff}, @time=@time={r5, r6+10000000}}], 0xc0) 15:34:38 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) pread64(r0, &(0x7f0000002480)=""/4096, 0x1000, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt(0xffffffffffffffff, 0x7fff, 0xe1, 0x0, 0x0) r3 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) r5 = dup2(r4, r4) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$alg(r5, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}], 0x1}, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:systemd_notify_exec_t:s0\x00', 0x2b, 0x2) fadvise64(r4, 0x1e, 0xd8, 0x7) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000200)={0x4, 0x0, 0x6, 0x0, 0x1e}) 15:34:38 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x120000000000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000240)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x14) getsockopt$inet_int(r0, 0x10d, 0x3f, 0x0, &(0x7f00000000c0)) 15:34:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000600)='user\x00', 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b", 0x1c, 0xfffffffffffffffb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x2, 0x20040) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)='overlay\x00', 0x8, 0x0) r4 = dup2(r2, r2) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="86511f380ac986b40ad9aaa2e7bd86047bc60ff863bf728ad568"], 0x1}}, 0x44801) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)=0x3) accept4$unix(r4, 0x0, &(0x7f00000001c0), 0x80000) getsockopt$inet6_tcp_buf(r4, 0x6, 0xb, &(0x7f0000000500)=""/184, &(0x7f0000000080)=0xb8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0xffffffffffffff9d) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) timerfd_gettime(r3, &(0x7f00000003c0)) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xe) setsockopt$inet6_dccp_int(r4, 0x21, 0x4, &(0x7f00000000c0)=0x3ff, 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000340)={0x6, 0x0, 0x4, 0x2000, {r5, r6/1000+30000}, {0x5, 0xc, 0xfff, 0x80, 0x100000001, 0x5, "b06a8b18"}, 0x0, 0x7, @planes=&(0x7f0000000300)={0x6, 0x1000, @userptr=0x5, 0x3}, 0x4}) epoll_create1(0x80000) 15:34:39 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") 15:34:39 executing program 2: r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0xe, 0x80800) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f00000000c0)=0x18000000000000, 0x2) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="716ac332dc195fe73f5ce9073f900be8a5fd63ce59ee839cd1d6c7d0cf855591b47de2fd150ed533", 0x28, 0x10, 0x0, 0x0) 15:34:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{&(0x7f0000000080)=@can, 0x80, &(0x7f0000001680)=[{&(0x7f0000000100)=""/231, 0xe7}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000240)=""/254, 0xfe}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/117, 0x75}, {&(0x7f00000005c0)=""/143, 0x8f}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x7, &(0x7f0000000040)}, 0x7fff}, {{&(0x7f0000001740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000030c0), 0x0, &(0x7f0000001b80)=""/16, 0x10}, 0x20}, {{&(0x7f0000001bc0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000002c40)=""/179, 0xb3}, {&(0x7f0000002d00)=""/104, 0x68}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/171, 0xab}, {&(0x7f0000002e40)=""/136, 0x88}, {&(0x7f0000002f00)=""/36, 0x24}], 0x7}, 0x9}], 0x3, 0x10000, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f00000002c0)={0x8, 0x6, r1, 0x0, r2, 0x0, 0x56f02184}) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xffffffffc, 0x20080000003) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x5}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000380)={0x400, 0xffffffff, 0x8000, 0xfffffffffffffe00, 0x6, 0x400, 0xffffffffffffff81, 0x8, r5}, 0x20) syz_execute_func(&(0x7f0000000000)="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") 15:34:43 executing program 2: 15:34:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r3, 0x4) syz_execute_func(&(0x7f0000000000)="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") 15:34:44 executing program 1: 15:34:44 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:34:44 executing program 1: r0 = dup(0xffffffffffffff9c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cubic\x00', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") r2 = gettid() clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setrlimit(0x7, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x10e, 0x9, 0x20000000000004, 0x1, 0x0}, 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3d) wait4(0x0, 0x0, 0x0, 0x0) 15:34:44 executing program 3: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") socket$vsock_stream(0x28, 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="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") 15:34:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") clock_adjtime(0x0, &(0x7f0000000240)={0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1ff, 0x0, 0x2, 0x2, 0xc561, 0x80, 0x4, 0x8, 0x7, 0x80, 0x1f, 0x3ff, 0x5, 0x10001, 0xfff, 0x52, 0x3, 0x1, 0x9b11}) 15:34:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000900)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5, 0x0, [{}, {}, {0x0, 0x7f, 0x0, [], 0x6}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}) 15:34:45 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='.u\n:d]:.,[:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\x98\xd1\x00\x00BR\xd7\x1fW,\xf6\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) readahead(r0, 0xd65c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000500)={0xa0, 0xfffffffffffffff5, 0x2, {{0x2, 0x3, 0x1ff, 0xb6e, 0xc00000, 0x0, {0x3, 0x96, 0x8, 0x867, 0x4, 0x9e1, 0x5cf7, 0x4, 0x80000000, 0x6, 0x5, r3, r4, 0x0, 0x20}}, {0x0, 0x2}}}, 0xa0) r5 = syz_open_procfs(r2, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000300)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={r1, @multicast2, @local}, 0xc) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1e123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") 15:34:52 executing program 1: 15:34:52 executing program 2: 15:34:53 executing program 5: 15:34:53 executing program 4: 15:34:53 executing program 1: 15:34:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000240)={{r3, r4+10000000}, {0x77359400}}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:34:53 executing program 3: r0 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x0, 0x3) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000180)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) 15:34:53 executing program 2: 15:34:53 executing program 5: 15:34:53 executing program 4: 15:34:53 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x1}], 0x0, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000080)) r1 = socket(0xb, 0x3, 0x9) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000180)={0x34, 0x5, 0xb, 0x6, 0x49cb}) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x80000, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000001c0)) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000200), &(0x7f0000000240)=0x30) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001800)={{{@in=@rand_addr=0x100000000, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x4, 0x4e22, 0x81, 0xa, 0x80, 0x80, 0x87, r2, r3}, {0x1ff, 0x5, 0x6, 0x2, 0xbf, 0x9d2, 0xe6, 0x1}, {0x8, 0x9, 0x7, 0x1}, 0x9, 0x6e6bb1, 0x1, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0x3c}, 0x0, @in=@local, 0x0, 0x2, 0x2, 0x8, 0x3, 0x8, 0x7}}, 0xe8) [ 774.278551] audit: type=1400 audit(1556724895.819:15950): avc: denied { map } for pid=22514 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:57 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa2000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x80ffff}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r1) [ 774.465600] protocol 88fb is buggy, dev hsr_slave_0 [ 774.471405] protocol 88fb is buggy, dev hsr_slave_1 [ 774.507767] audit: type=1400 audit(1556724895.829:15951): avc: denied { map } for pid=22504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:34:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="ce53fdda8345a70256bdc5363664618ea29816cdcfc7f8de257314774932ef90d00770d85132f0618654b4db8c54152c7ea1821a5e67db5acfefd85014b66242e2cdab37f6ee51109e6ef16605d8ebf3775818ae8e92a0632e516a0f068e163d290e2cde02dfd72b138ddec11a9e6f44811a8a50b4a578601a2a436cde071b2f03d58950b6b754ab9afc97c8dd34190ead27e81a026e99e1474ab1779f24e24bd834e48dc7c01e57bd49e61b73f692131a4c2410444e8b9f64e512f6e5b0dfc3d599ee7989ab9c8830ba352bb15fecbc072940adbe9ee266ad5e041d531f5d82bb586cf6fafe06183397801862b2f5f33bc36d0a2c372555b401d6", @ANYPTR64, @ANYBLOB="b4156ba6bf26608f360860dbf9d2e21f15fa0300435b07a9a05685a81a5eb9dcda30efc3964ff7acbabf9eb95181bde201c9ad904f1057c04f1ba6513176b80f8597dbf66d82b50ba2cf9569617acca8c5ba527dfc7822e0e219bc1642d51eacc663b8bf768b45c3a822e6224f71e475c8c11cd57c69e9d29b57c0cfd1e6bfd95daa0080d77edd56b072558bf600ab3fabeadfd7dc59037f699a6db8231888", @ANYBLOB="0d042e3aa47470f521fd6b912b020feda3d9a50cf2eb4a12ffc64fd543afce2e0eb513fe1a1927d6f604053ffe6ec6acea1339e0393ea9ed57f43a5569c8d5e2a7d35587d448635cc4d4b9d524fc5c313452eac5f4fbcdc85688fdd29a88e603802d2708cc9f0ce18fa44594103df25cb20ee6728eb7c1ec1729b317a93a9fea413bc02984916f1277d148be3d8d3deb9dcf110ee8c41d8a75dc7034e130faa85316ef07459b459a29efc6ecd77be0", @ANYRESHEX=r2, @ANYRES32=r2, @ANYBLOB="09c5759bfcc395d6c3a47a799da84ff27ba463c145dc3087876f696a36bc992f543e02b57d38996e086ccb6f264f334d23e6133e7ae0c55ee7b3d8ad4688c26a4158438d0c5722d5c62d6aa1ed5b0172910f0b0081fa5d9c97ce9ed2c5db04278b82cf54103ccca5b97d38057829d31964bf1ac5ca597ec35b8c5f34446b43d50c216f01434ffca0ca8e8cd43b40b63529546316efbefda941ef681c9214d463f99b21fc3041befc12081cb245b4", @ANYRESDEC=r1, @ANYPTR], @ANYRESHEX=r0, @ANYRES64=r1]], 0x8) timer_create(0x7, 0x0, 0x0) fcntl$addseals(r2, 0x409, 0x8) epoll_create(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) 15:34:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4e97, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4002, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000008c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r1, 0x0, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000900}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2d978e87077e7370}, 0x20048085) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) accept4(r0, 0x0, &(0x7f0000000080), 0x800) 15:34:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x5, 0x4002) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000180)=0x1, 0x4) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f00000002c0), 0x4) 15:34:58 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="3e8c93aa4f4462daf6a27ea6d7bf7d30da2aecf4ed119ea3d3853070f4c6b19b91674c38d4bdc1c1c380a01e35cd1c692a49961130c80f2323f7b5297aec8511533ccebb5e523738361356a808d62b1aff8eae49734d0a0b93ae6479efe84313b0f40f9b83c3abc47e883f4905a8c21171b8f2d457206d5dadf330aecee479be7bd206aa0845457c46be0cb23445f274f6f61321f7d1635f432c834873ec8b", 0x9f}], 0x1}, 0x4000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f00000002c0)={0x1, 0x1000, 0x400, 0x8, 0x11, 0x20}) sendfile(r1, r2, &(0x7f00000000c0)=0x202, 0xdd) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") write$P9_RCLUNK(r0, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000001c0)={0x7, 0x4, 0x5, 0x7, 0x1000}) syz_execute_func(&(0x7f0000000000)="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") 15:34:58 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x400000, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000007c0)='TIPC\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e23, 0x5, @mcast1, 0x9}, {0xa, 0x4e24, 0x4, @mcast2, 0x1}, 0x5, [0x1, 0xffff, 0x1ff, 0x101, 0x44e1, 0xffffffffffffff7f, 0x80, 0x2]}, 0x5c) getpgid(0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0, r2, 0x7}) ptrace(0x10, r1) rt_tgsigqueueinfo(r1, r1, 0x1e, &(0x7f00000001c0)={0x2d, 0x5, 0xd38a}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 15:34:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x900) r4 = gettid() lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=ANY=[]) ptrace$setopts(0x4206, r4, 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) r6 = syz_open_dev$vcsa(0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r5}, {r6}], 0x2, 0x0) dup2(r5, r6) syz_emit_ethernet(0x33, &(0x7f0000000300)={@dev={[], 0x10}, @broadcast, [{[{0x9100, 0x0, 0x8, 0x1}], {0x8100, 0x1f, 0x8cc5}}], {@mpls_mc={0x8848, {[{0x400, 0xe83, 0x10200000, 0x101}, {0x5, 0x7, 0x6, 0x94}], @llc={@snap={0x1, 0x1, "ab", "c6f31a", 0x12, "9b4c3dd206dd04440f07c5d361"}}}}}}, &(0x7f0000000340)={0x0, 0x2, [0x58c, 0xa27, 0x19f, 0xa8b]}) tkill(r4, 0x32) 15:34:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000100)={@ipv4={[], [], @multicast2}, 0x50, r2}) r3 = dup3(r1, r1, 0x80000) preadv(r0, &(0x7f00000017c0), 0x0, 0x700) ioctl$TCFLSH(r1, 0x540b, 0x40) sendto$x25(r3, &(0x7f0000000140)="4409386d656a6b30d844b6e0e6a2783257b687c16717180fc581baf12e8b2bf5d8a1720441d98b4df978745b3f4b386de1682aaaf3049205fb8d2f466d1539163d6f40c41f129da9028314271dde51b5fece39f1e5ececaee4987c64f47cbe9f0af4758baa9b9576774aa65cf663b4059a37845951d182aa8626a860f5ce479a35d409ff0361cfd4ed29497c1e7f11c1bebeb0e16c4a159330e01e922c9f5e030b5b13", 0xa3, 0x8000, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) 15:34:59 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000400)=""/68, &(0x7f0000000540)=0x44) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x9) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) mount(0x0, 0x0, &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) write$eventfd(r1, &(0x7f0000000340)=0x80000000, 0x8) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x0, 0x0) fstat(r2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000780)={0x0, 0x16, 0x0, {0xfffffffffffffff7, 0x4, 0x757b7f5f, 0x0, 0x2, 0x2, 0xd, 0x3}}) accept$unix(r1, 0x0, &(0x7f0000000000)) 15:34:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) write$P9_RLCREATE(r0, &(0x7f0000000180)={0x18, 0xf, 0x2, {{0x10, 0x0, 0x3}, 0x8000}}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$caif_stream(0x25, 0x1, 0x2) syz_execute_func(&(0x7f0000000000)="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") gettid() 15:34:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000180), 0x4) close(r0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x800) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x4, 0x9, 0x4}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x0, 0xfffffffffffffffb, 0xa1, 0x2, @buffer={0x0, 0xa, &(0x7f00000001c0)=""/10}, &(0x7f0000000200)="b96f155d2ce0f9aa861dc645b79de335f2c69c9166c067d7971da783b1736d25a83e803ca04545e368c0aa6f4974a67b46f2589e8a6a69e00a63fd6ef38a798821d5544126817001002e6b87a2ef535497cf29fbeaaa8eb50f43647443098e41a8d4fb94539c2e928c155a84bb4c585c76fdeafe3d88b75221985aa099397bdb6d4aed006ed3d6be7e2ade637372ba9974d66ed8e8217d070645faa38492207a2c", &(0x7f00000002c0)=""/97, 0x2, 0x34, 0x2, &(0x7f0000000340)}) 15:35:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xfffffffff7ffffff, &(0x7f00000001c0)="e24b84e223357a0bb31d2134c583584d39bac07a6d8eb812815c72b6aacbfaa18a204bc3ce3c09ceac140075ef80bcafc396866171d9144fa86348d7bfa820b7934324ecc37893375e6ad568ff820d2cf8ca1a6e278d657b426a17cd36acd40501766f1b22b3739d5e3da65efa2a11f1852b20d6649a269821a52a6ef37508178920aaf7") keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="8165772064656661756c7420757365723a6e6f64657620"], 0x1, 0x0) r1 = gettid() openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x0, 0x1, 0x9, 0x0, 0x7a0, 0x4004, 0xd, 0x8, 0x1, 0x3, 0xfffffffffffffff7, 0x8000, 0x8000, 0x2, 0xd847, 0x3, 0x6, 0x8, 0x8, 0x3fa3, 0x7, 0x9ae, 0x81, 0x6, 0x100000001, 0x59, 0x2bb, 0x0, 0x1, 0x730, 0x2cd9, 0x9, 0x0, 0xfffffffffffff800, 0x1f, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0x36}, 0x4000, 0x20, 0x6, 0x6, 0x5, 0xcf9, 0x6}, r1, 0xe, r2, 0xa) add_key(&(0x7f0000000300)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000340)="be91889f87302232a741e080e9f1bb26843bc9378f93db97bd8a9ca0bba7c83867866a257f591aafc73c0f4e09b2c730b99765c7ca14bbf828a90f437e6201cd63b825c59d80932ecdb4a864", 0x4c, 0xfffffffffffffffc) 15:35:00 executing program 5: r0 = memfd_create(&(0x7f00000002c0)='\xbc\xf6', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000080)={0x43}) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2201000, &(0x7f00000000c0)) 15:35:00 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x141000, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1ba, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x40, 0x0) 15:35:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x4}) ioctl$TCSBRKP(r0, 0x5425, 0x80000000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000180)={0x2, 0x8, 0x10001, 0x3, [], [], [], 0x3000000000000000, 0xfffffffffffffff8, 0x2, 0x0, "682a79d140b5cfc2a4a420df59e3bd23"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x2f, &(0x7f00000002c0)=0x2e9, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000003c0)={r0, r0, 0x7}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000004c0)={0xa, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000540)={0x0, 0xfff, 0x8, [], &(0x7f0000000500)=0x1}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000580)=[@mss={0x2, 0xd9}], 0x1) readv(r0, &(0x7f0000000a80)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/149, 0x95}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/27, 0x1b}, {&(0x7f0000000780)=""/234, 0xea}, {&(0x7f0000000880)=""/94, 0x5e}, {&(0x7f0000000900)=""/236, 0xec}, {&(0x7f0000000a00)=""/91, 0x5b}], 0x8) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000b00)=0x4, 0x4) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TIOCMBIS(r6, 0x5416, &(0x7f0000000b80)) connect$can_bcm(r6, &(0x7f0000000bc0), 0x10) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000c00)={0x10000004}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000c40)={0x9, 0x1457, 0x8, 0x2, 0x6, 0x8, 0xf20, 0x48, 0x0}, &(0x7f0000000c80)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000cc0)=r7, 0x4) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x34, r8, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10d610e2}]}, 0x34}}, 0x800) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e40)) [ 777.951538] audit: type=1400 audit(1556724900.509:16139): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:01 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x101) r0 = open(&(0x7f0000000600)='./control\x00', 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xfffffffffffffffe) mknodat(r0, &(0x7f0000000000)='./control\x00', 0x0, 0x5) faccessat(r0, &(0x7f000003fff6)='./control\x00', 0x0, 0x0) [ 778.126238] audit: type=1400 audit(1556724900.539:16140): avc: denied { map } for pid=22632 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.149163] net_ratelimit: 20 callbacks suppressed [ 778.149169] protocol 88fb is buggy, dev hsr_slave_0 [ 778.149232] protocol 88fb is buggy, dev hsr_slave_1 15:35:01 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e21, 0x1, @ipv4={[], [], @local}, 0x3}, {0xa, 0x4e22, 0x100000000, @local, 0x80}, 0x0, [0x3, 0x200, 0x5, 0x7ff, 0xa2d, 0x3d9, 0x101, 0x4]}, 0x5c) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x7fffffff, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x4}) ioctl$TCSBRKP(r0, 0x5425, 0x80000000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000180)={0x2, 0x8, 0x10001, 0x3, [], [], [], 0x3000000000000000, 0xfffffffffffffff8, 0x2, 0x0, "682a79d140b5cfc2a4a420df59e3bd23"}) setsockopt$inet6_tcp_int(r0, 0x6, 0x2f, &(0x7f00000002c0)=0x2e9, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000380)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000003c0)={r0, r0, 0x7}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/mixer\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000004c0)={0xa, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000540)={0x0, 0xfff, 0x8, [], &(0x7f0000000500)=0x1}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000580)=[@mss={0x2, 0xd9}], 0x1) readv(r0, &(0x7f0000000a80)=[{&(0x7f00000005c0)}, {&(0x7f0000000600)=""/149, 0x95}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/27, 0x1b}, {&(0x7f0000000780)=""/234, 0xea}, {&(0x7f0000000880)=""/94, 0x5e}, {&(0x7f0000000900)=""/236, 0xec}, {&(0x7f0000000a00)=""/91, 0x5b}], 0x8) setsockopt$bt_hci_HCI_DATA_DIR(r4, 0x0, 0x1, &(0x7f0000000b00)=0x4, 0x4) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TIOCMBIS(r6, 0x5416, &(0x7f0000000b80)) connect$can_bcm(r6, &(0x7f0000000bc0), 0x10) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r4, &(0x7f0000000c00)={0x10000004}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000c40)={0x9, 0x1457, 0x8, 0x2, 0x6, 0x8, 0xf20, 0x48, 0x0}, &(0x7f0000000c80)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000cc0)=r7, 0x4) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r5, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x34, r8, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10d610e2}]}, 0x34}}, 0x800) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000e40)) [ 778.670785] audit: type=1400 audit(1556724900.559:16143): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000140), 0x0, 0x1) 15:35:01 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000080)="40f5259e31ead41a630804f367c4447b33"}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000380)=0x70, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff0d) [ 778.847736] audit: type=1400 audit(1556724900.559:16144): avc: denied { map } for pid=22630 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 778.875558] protocol 88fb is buggy, dev hsr_slave_0 [ 778.880729] protocol 88fb is buggy, dev hsr_slave_1 [ 779.045525] audit: type=1400 audit(1556724900.579:16145): avc: denied { map } for pid=22631 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 779.117126] protocol 88fb is buggy, dev hsr_slave_0 [ 779.123626] protocol 88fb is buggy, dev hsr_slave_1 [ 779.190250] audit: type=1400 audit(1556724900.579:16146): avc: denied { map } for pid=22632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x80000000, 0x30, 0x1f, 0x1}, &(0x7f00000000c0)=0x18) preadv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/218, 0xda}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000100)={r2, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) preadv(r1, &(0x7f00000017c0), 0x1be, 0x700) 15:35:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x6b, &(0x7f0000000680)={&(0x7f0000000000)=@ipv4_newroute={0x30, 0x18, 0xe01, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_GATEWAY={0x8, 0x4, @rand_addr=0x75f}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) 15:35:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000300)=0x200000072, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) sendto$inet(r0, 0x0, 0xfffffffffffffda0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e26, @local}, 0xfffffc7e) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x400000000141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x10507e) r4 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, &(0x7f0000000080), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) renameat2(r2, &(0x7f00000001c0)='./bus\x00', r2, &(0x7f0000003bc0)='./bus\x00', 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x2004, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x40804) syz_genetlink_get_family_id$tipc2(&(0x7f0000003b80)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000003f80)={&(0x7f0000004bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x800) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xffffffffffffff5e) sendfile(r3, r4, 0x0, 0x80003) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') recvmmsg(r0, &(0x7f0000003b00)=[{{&(0x7f0000000340)=@generic, 0x80, &(0x7f0000002440)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/75, 0x4b}], 0x3}, 0xfffffffffffffff8}, {{&(0x7f0000002480)=@pppol2tpv3in6, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002500)=""/208, 0xd0}, {&(0x7f0000002600)=""/219, 0xdb}, {&(0x7f0000002700)=""/193, 0xc1}, {&(0x7f0000002800)=""/194, 0xc2}, {&(0x7f0000002900)=""/211, 0xd3}, {&(0x7f0000002a00)=""/134, 0x86}], 0x6, &(0x7f0000002b00)=""/4096, 0x1000}, 0x4}], 0x2, 0x0, &(0x7f0000003b40)={0x0, 0x989680}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@generic={0x0, 0xfffffffffffffffb, 0x6}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 15:35:03 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000540)) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000002340)=""/4096, 0x1000, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000021c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000340)=""/197, 0xc5}, {0x0}, {&(0x7f0000000440)=""/45, 0x2d}], 0x4, &(0x7f0000000680)=""/76, 0x4c}}, {{&(0x7f0000001b00)=@ax25={{}, [@default, @rose, @null, @netrom, @rose, @default, @netrom]}, 0x80, 0x0, 0x0, &(0x7f0000001d00)=""/229, 0xe5}}, {{&(0x7f0000001e00)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000020c0)=[{0x0}, {&(0x7f0000001f80)=""/241, 0xf1}, {&(0x7f0000002080)=""/50, 0x32}], 0x3}, 0x4}], 0x3, 0x40000000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x110, r0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 15:35:03 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) gettid() fcntl$getown(r0, 0x9) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r2 = syz_open_procfs(r1, &(0x7f0000000080)='smaps\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000891a, &(0x7f00000001c0)="0adc1f123c123f319bd070314dfe4746e9eb460835950ab6e8816ff1880665fe3af3edd44459670a386d54ba01b37b9cff08be0628bbb692273332aead9f832360c472c1937566713882b8989f31d10a7cc200fdecb471664621e71ab86228adb53d58234279439365b3f066cb247d573d8ece8688124b2853a06b917078a77443abebf582c19e83c4df6d6ca6051ea51988009a7162fa4b13820ba992a560c0aeb0741e0dd0f6fa07c8f6d7") sendfile(r0, r2, 0x0, 0x88008) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000040)=[0x8000000000]) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) 15:35:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x0}) setgid(r4) setuid(r3) 15:35:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) open(0x0, 0x500, 0x4000000099) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') syz_execute_func(&(0x7f0000000080)="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") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)) r1 = socket$packet(0x11, 0x3, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) recvmmsg(r1, &(0x7f0000000300), 0x0, 0x1, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000000)=0x7, 0x4) [ 781.347493] IPVS: set_ctl: invalid protocol: 47 172.20.20.170:20002 15:35:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) sched_setscheduler(r0, 0x6, &(0x7f0000000040)=0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) 15:35:05 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0xc3, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000440)='/dev/uinput\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x9, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x7}, 0x0, 0x20000000, 0x0, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x1) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x0, &(0x7f0000000100)=0x8, 0x8) 15:35:05 executing program 3: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="994a2ae92c02964c0f05bf03000000c4a37bf0c5fe41e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f4607c421dd589fc4e10bf8e426f2f045f619640f0f6f43a038fd52262e2e66450f7d64c60865f2ad0383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddea660f79cec462b1f72ec3c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa66450fc4650000c4e39978c104d9a1e8719e70ddcdcda2660f38346800c4e3295d4c3dc8a3c4c1045ccc7d75c4426507af0f0000000f5fd25cf3460f2ad0f30f5ea5a9a50000ffff660f79ca553131b83a00a2f1fbfb766208cf") rt_sigprocmask(0x1, &(0x7f0000000180)={0x74}, &(0x7f00000001c0), 0x8) 15:35:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000ffffff00041fb80b80373d51ea0d928c9dd2fcf2006b69f965bc5491acefb9e30d38073b45546f792af1686dbf3e0dd6eb3abbedfa71c5c06ce068eea9b682128700d1b50f9c49bdf91014a6310f3db57b85c9d223482d5c9307c5da120e6e"], 0x14}}, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="3ca25eafa7dd94438245812e359c3651d02bb4bf5ba4c2fb941ab34f31cb51f08dcef04cf46827d93c8397ad286f943caea808968d745849fed6f979e05f7763b6489a177c24e2d23fce31cd0ef29d54b09df5ff08918dd4d2da87bec6e44e53f4899757149d99d8ac538af2753430b0776175365bf5cbfdb04372214497a4f305d92942eee6b9a9fc84a83825f667a71de20200a9aa76233160a003ecc11891d685e6d7f6c7a03e7e638e7ea13af543", 0xb0, 0xfffffffffffffffd) r1 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000140), 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x8000) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x0, 0x4) 15:35:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x6}, &(0x7f0000000180)=0x8) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x84001, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0x1}}, 0x4, 0x400, 0x7, 0x548c, 0x40}, 0x98) write$P9_RLCREATE(r3, &(0x7f00000002c0)={0x18, 0xf, 0x2, {{0x54, 0x4, 0x6}, 0xfff}}, 0x18) write$vnet(r1, &(0x7f00000005c0)={0x1, {&(0x7f00000004c0)=""/105, 0x69, &(0x7f0000000540)=""/70, 0x3, 0x1}}, 0x68) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000300)=""/83, &(0x7f0000000380)=0x53) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000003c0)=0x47c) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f0000000400)={0x4, "0307c44c8127ab3ef064aae6a289223598f723089b512f329755786642e0ea2c", 0x3, 0xfe, 0x9, 0x0, 0x4}) close(r0) r4 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trafs=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6fa573000000", @ANYRESHEX=r0, @ANYBLOB=',\x00']) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000480)={r2}, 0x8) 15:35:05 executing program 5: syz_execute_func(&(0x7f00000002c0)="985e4aa84a1c6d0f05f359bf21000000c4a37bf0c54041e2ebe2a2363e460f1a7000660ffc97660f6b32e51212b8c4014e4e4f751ec4016d7d14dec4a2513c06b921045fc507f240d1d2c4e10bf8c45bc4c66db712c483397fd300f7dcdc0fbcaf10009ec4c27d0a21ac6161c4c3214cb9a5605419c201b04b9700cff08171a30b8a826eefa80dd4d48cc7e8628f680864360fe258009e698de3c0f526264788fec4a1dd7dbbbfdd5cc6c46249bedc32a1c9fb1166470f383a4d4b") r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200040) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x8001, 0x8}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000440)={r1, 0x10}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000003c0)=0x20) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000380)={0x0, r0, 0x0, 0x3, 0x306, 0xf91}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8005}, 0x4040000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x80000000, 0x1, 'client1\x00', 0x5, "7b8d75189b7e709e", "fb4f5bac686a5ee5eb46271cac3dcd653e452615a3439516ec491209cebc1bc3", 0x8000, 0x5}) [ 782.715991] kauditd_printk_skb: 219 callbacks suppressed [ 782.715999] audit: type=1400 audit(1556724905.649:16366): avc: denied { map } for pid=22784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 782.848602] audit: type=1400 audit(1556724905.679:16367): avc: denied { map } for pid=22784 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffe93, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x4000000000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$SG_GET_PACK_ID(r1, 0x227c, 0x0) mount$9p_rdma(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1000008, &(0x7f0000000380)=ANY=[@ANYBLOB="87892c36e66c6b3c00e582c10507ff23a0f8ea4ce18e1c70f02ec17cab64c2e49a1ed2bf28d0d6d2e21ac51860ef2b72db01210ee93bfa7d0cad9142b1133fc2cab462d6ff8ad08df1bf5a315e8a8a8929abebee1107c6027c4b138a4188c103192922fa3daa7d15698e88d50d9967d94c57def92d6b15c612c714241b985334999542652af7059869eb9001b5f1a7c16ba05b10fe3164bf16"]) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000b80), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x400, 0x158) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) 15:35:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="120000000000000000c0630000000000000f0000000000000000000000000000000000008ae959b1fe09000000f982b82ab416da9dc2c57aaf6db779d4e0400a6b91985edff3ba88090e62a61cb421ca113c4b5230fe2555d76d8f60bd9ea9c7fbe463fe15a68208586791b5f4def0ca7c0863174285c235d2dde8160ed5797558a9c87ca63091ddc21a3438108e304c3b87b4a216ae2c19835ebd7f14f02df8e9a3102ac34f7cdc8b640ed7142693e84c315d12e73e6888a7670c27d2c9fbdb9ed85176404c47af37825f528ece4dbf978ff8f5ded8dd27e923019783f978c3278098a60be8"]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x2000) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x402, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000280)=""/48, &(0x7f00000002c0)=0x30) [ 783.055740] audit: type=1400 audit(1556724905.689:16368): avc: denied { map } for pid=22784 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0xffffffffffffffff) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000002c0), 0x2) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) r3 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r2, r3) 15:35:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x4, 0x7, "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", 0x74, 0x2, 0x5af8e76b, 0x100, 0xc2a, 0xffffffff, 0x5, 0x1}, r2}}, 0x120) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") pause() r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r4, 0x5}}, 0x10) connect(r3, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x1, 0x4, 0x1, 0x3}}, 0x80) syz_execute_func(&(0x7f0000000c80)="c4e3f9614832f04a2be93699980f053ef3aec4a37bf0c50241e2e926b5c9459828218d00a30000262ff342906646da4e329200d2dec461dc55b1e6172525000e818f470f94c980008080e2859ecf69e08f4cbec566470f6ff28f56c4613fc21d9053c7ab86c4213e5377000043d9497dbf825959438f34b267f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b1500909660fdf53098f49609a567be3c92626897474d866dee4b6c1f01a434302660f38de8e85e1f32646ec9f31c431c40f12e400f4260fe88c4200000000ca30cac4017a7fc3bb3cbb3c0209912af3430f47bb000000000000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0b11a17be64295589cffffc3bd7c6d83004577cb0c0ce42ec4a17c1002970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247aceced36660f38058b976192361d09f4f5e5979747910002c1045c0b47cc47cc5c389f9f060f0f2ef246e16d4401a9bb000042d8fb4974ec0b31c4617ddd880c0000003422") [ 783.736278] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.752670] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.759830] audit: audit_backlog=65 > audit_backlog_limit=64 [ 783.780433] audit: audit_lost=181 audit_rate_limit=0 audit_backlog_limit=64 15:35:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0xffffffffffffff2e, 0x0, 0x0, 0x0, 0xd2822aedb9ecee63}}], 0x38f, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f0000000740)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000840)={[], 0xa0, 0xbf3, 0x1d08000000, 0x2, 0x3, r3}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000780)={0x4, 0x2}) ioctl(r1, 0x1000008912, &(0x7f0000000440)="0adc1f123c123f13a592b9319bd070") sendmmsg$inet_sctp(r0, &(0x7f0000000700), 0x0, 0x10) syz_execute_func(&(0x7f0000000000)="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") getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000007c0), &(0x7f0000000800)=0xffffffffffffffa8) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000400)={0x10000}, 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000340)={'filter\x00', 0x0, 0x4, 0x55, [], 0x9, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000002c0)=""/85}, &(0x7f00000003c0)=0x78) 15:35:11 executing program 4: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x1, 0x81}]}, 0xc, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0xfc) 15:35:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x3, 0xe8}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000540)={r2, 0xff}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) r3 = accept4(r0, 0x0, &(0x7f0000000300), 0x800) accept$ax25(r3, 0x0, &(0x7f0000000480)) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) ioctl$DRM_IOCTL_DMA(r4, 0xc0406429, &(0x7f00000002c0)={r5, 0x9, &(0x7f00000001c0)=[0x3f, 0x40, 0x8, 0x100000000, 0x7, 0x9, 0x5, 0xf0a7, 0x6], &(0x7f0000000200)=[0x10000, 0x100000001, 0x9], 0x10, 0x4, 0x1, &(0x7f0000000240)=[0x400, 0x9, 0x7, 0x7], &(0x7f0000000280)=[0x4]}) syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x80000000) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000080)="f55d821e179ba1188e6d30377d3c3138eed9fe2b76c9e50071aa27c1140b30502825526330fb062a19caca3c54af84dd07b577313a813b36c76c524985b5d3e1742e9bf16201dfb0166be94ee1039884ad3b899b6e96055c817cb243bbe89cf30543172b90ae09d8daefb8d4ec7056004b3ee9c6d4dfb88206ad19a1f839ddca1a0463ad742a04d0d59e0354ab0d61527c8c88d4ba8593") preadv(r4, &(0x7f00000017c0), 0x1be, 0x700) 15:35:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400000) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8, 0x2, 0x4, 0x2, 0x6, 0x7, 0xfffffffffffffff8}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x6, 0x31, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xb84, 0x1}, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, 0x100, 0x200}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x7a}}, 0x10) keyctl$session_to_parent(0x12) ioctl$SIOCGSTAMPNS(r1, 0x8903, &(0x7f0000001280)) 15:35:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x4920, 0x0) listen(r0, 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) io_setup(0x0, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xffffffffffffffd5, 0x101}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0xfffffffffffffffc, 0x3f, 0x5, 0x7f, 0x8}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, 0x4) prctl$PR_SVE_GET_VL(0x33, 0x10e0f) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000340), 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x80000001, 0x0, 0x0, 0x1000000000054}, 0x98) [ 790.923798] IPVS: ftp: loaded support on port[0] = 21 15:35:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) uselib(&(0x7f0000000080)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v audit_backlog_limit=64 [ 794.785546] protocol 88fb is buggy, dev hsr_slave_0 [ 794.790692] protocol 88fb is buggy, dev hsr_slave_1 15:35:17 executing program 2: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f00000002c0)={0x20080522, r0}, &(0x7f0000000240)) bpf$PROG_LOAD(0x9, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x854f, 0x40) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)=0x2) 15:35:17 executing program 4: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x2b, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xe006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x6, 0x0) write$selinux_create(r2, &(0x7f0000000240)=@objname={'system_u:object_r:dlm_control_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0xfffffffffffffff9, 0x20, './file0\x00'}, 0x56) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000200)='\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd') close(r5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r4, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) close(r5) 15:35:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'veth0_to_hsr\x00', &(0x7f0000000040)=@ethtool_rxfh_indir={0x38}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPIN\x00', &(0x7f0000000100)='/selinux/user\x00', 0xe, 0x3) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) 15:35:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ipx, 0x7e, 0x0, 0x10e}}], 0x2a2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x42840000}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="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"], 0xc0}}, 0x20000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, @in={{0x2, 0x4e24, @rand_addr=0xff}}, 0x401, 0x3}, &(0x7f0000000100)=0x90) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001300)={r2, &(0x7f0000000200)="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", &(0x7f0000001200)=""/241}, 0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1}, &(0x7f0000000180)=0x8) 15:35:18 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000400)=0x8, &(0x7f0000000440)=0x4) ioctl$int_in(r1, 0x800000c0045005, &(0x7f00000004c0)=0x100040000) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x16, @remote, 0x4e23, 0x1, 'lc\x00', 0x10, 0xf962}, {@multicast2, 0x4e21, 0x0, 0x6154, 0x7, 0x80000001}}, 0x44) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000340)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @multicast2}, 0x14, 0x0, 0x0, 0x0, 0x7b, &(0x7f0000000300)='batadv0\x00', 0x7, 0x100, 0x5d10}) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r2 = fcntl$dupfd(0xffffffffffffffff, 0x404, 0xffffffffffffffff) r3 = socket$bt_rfcomm(0x1f, 0x1, 0x3) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000000040)={0x0, 0x0, [0x3, 0x0, 0x100000000, 0x0, 0x5, 0x0, 0xb7]}) recvmsg(r0, &(0x7f0000000780)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/78, 0x4e}], 0x1, &(0x7f0000000680)=""/207, 0xcf}, 0x2000) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="0e7ed675a61a4426bc49b7b25e10dade8d0f630222a47d58c29dffc4ce1cdf91218a1aef3bb6025d68b982f1e73b5f453930e2e34455d923c7149079650722f777", 0x41, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, r4) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000240)=0x5) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$setflags(r3, 0x2, 0x1) 15:35:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="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") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x40380, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000003c0)=0x0) r6 = getpgrp(0xffffffffffffffff) fstat(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000002d00)=[0xee00, 0xee01, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) r9 = getpid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002d40)={0x0, 0x0}, &(0x7f0000002d80)=0xc) r11 = getegid() sendmsg$netlink(r2, &(0x7f0000002e40)={&(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfc, 0x4004}, 0xc, &(0x7f0000002c40)=[{&(0x7f0000000400)={0x281c, 0x36, 0x800, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x12f0, 0x66, [@generic="99f7b0d3957feca290b3bb62cf379f94547968e42a7d4592f0073d58efe3afa49e44562d26b9716235f636c5c8471f79853b73791173799c18d2d07ddf3c0d64d4507c31f12fe41e94f938569d2b20797c4ca9ab7b83e1af7fdc1a2f5c156daa2504aa7331a412c59afc98ef6667680abcb726664e3ec181e876e69d83891af02c2d9a6e61df21464df477c5c7d28e69a55956e0ac4aff1f6012a97429af0a30b9f89a3212bd2ab0f22787b90cfe1b8571b354ae9583baac76abf5c097f93b6654268829751d5335", @typed={0xa8, 0x89, @binary="6cae3fae6b31baea728e81714cf57334fb2a6de6c763e1b62521393083d46801a3a635ee3e85bb3313f17a2957cc730d80a089fac0150cd3a114c6bdb8840f0f69b13556a0f9e51f228327b8d810bd809e7e25578cdec7ce9756938683e378bca206e81e5681f364d39b70472c3025526474c959809627631de1ec4da9a61e15e0f7d439ddfde3c05f92139bead4f4f65d10f15919f4f300bcf7ab7bfe33ef86e5"}, @generic="ef21753e8f87d81dca0b4c28336ec5c4e6145b666494efdbe82bca6a9b235b360754e9243c4aa3e26aff897d029b250402aa0a2d3745dcd6dc2813183c1e091fa049cbb196bd69537db8156b02db492a3b79186df69b697a95b823dc917ad7eff147c9049c9769", @generic="6914eea5a7d43129cf1c7b9143f4aacf2fe174c8efef5f4561da13d03411e2045a729be3d5f1824185a730903e3c9207300f5ad5e2fe341776c617511ec11b53e478acb9ba5b9493980059d2ca8752c254bcfee361a6d9e044e2e4ba5fe0f9858ffd17f26c1afa9765de85a14b39cb02653da7d86dc964cd636c1a80fcdb16439ecee97576c1db6eb19f232fc9b3303f4d5cda878d37ec0afc3058acdb5a1f9d7745b30bc0a6ca2417ab0457cef7964f46bfa145e23f61fee6", @generic="d1fd3fbd7c469b8d533f549c4e227bda76c35ce74b33297e1f07b38286255c935a4a81012dbe8b6dc31ce43b4563a0fd25d25e3a6f3cd251190aac24efff0a7a24846b", @generic="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", @typed={0x8, 0x86, @fd=r1}, @typed={0x4, 0x47}, @typed={0xc, 0xf, @u64=0x7fffffff}]}, @generic="80f676604fccd216bec2890f93f0ed87b08a6bffea7acc14050cd502e09e3c8a26db3195168eaf00804e7646f4844db7075c60e88ee7911a67260770189246d7da126f3f3ac20adc6f6272e99bc6b57cc670e2b8fa52cb0fecce7db1a27198fd5ddcaf8443c4c7c097b89294adbf8fb0af4de37abcf977a3203666a49213961ea19beaa6627fe25305db4045408984c5192c21e334f1fe2f4f1824c11a2c76845f716c74fc70326baa8712c15d5a2636dad9d8014bd42ad86aa7", @generic="9ae5b57bead3f84ce8948d50d09a2d4ed16b1aa7bc6a4d83a1b5dde36908a6d255a8642bffb64880db2015bdceba5741acd6a70c3299874bad03bec8a589bd8f31384143e1e539627b18852b161d3d59b5eb104d4c239c5f1874a04ad93b050023f0f9176f071b35ca51b1ad5d541525891df7b515a61685cc5b7a35438ea2ab914f11afe8cfe379338d0424a355123b3df8630463ad2cb81c75e4d474ac21bdc7e38be462edbe7ef7304d9022d0b1eed8b3decc9a54a8699de5acee0cb9434db9f837fdb8a956fefa6c5b370993e133d40ef6405abcd6667b315cd73b38f9db7a", @nested={0xdc, 0x2b, [@generic="282389e5288628ea5638147c967a1f137ace157ab5198bb4e7aaab49e302c8091b64e437ef23651eb64c1e6ad393", @generic="6f1ac607dad50a980f60ca4c4c70fd598c7c42bf78f35521d5a8dba3fdb0b7c11c097496b2dac9a02edd3d0666ca865103c75613", @typed={0x4, 0x94}, @typed={0x8, 0x90, @pid=r3}, @generic="37b4d28328576a1faa7365e94e62a9d8a753d42dbe6c888218d4982f74288f2c0c32cfe7c4e7e4c4f7c2bcf7795a7ac3fcf98b3234a65d844011ab4e93164f61d7384b0b35596624b1502a62dabafe306a37199d66fb6452adc89b7000945ea1373e9015d4813e79ac"]}, @typed={0x8, 0x93, @uid=r4}, @typed={0x8, 0x88, @pid=r5}, @nested={0x1290, 0x5f, [@generic="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", @typed={0xec, 0x7f, @binary="9fc1af8d89b391710ce8aa1d0a6f0ee52472fca6fbf08e6d0b38a993751fe9066ec6e21064fd1a43d5270f8c5b312911fbd849c6ae6f35d8393e4e09c0d2bc343e0f6ef1e976aad9dd18014b940435eb5115a0a979bc1ba5d601daadf9477b530021d5973f8ae5f41b8c905d2158506d55ee0ba4af3fcc27d15c60d67ef1bfac466af9031943f3a400c77360ce78cf2dda9d019db9e62796112b3a7a948af9514cf956ea5df9e2f7a09fad4c8eb90c64f28b53b86e0d408bd379933377c9ef9eba59c694186a0abb5efd2688f3e9025d8fd3d336e4232caa45ca2eef10675c7cc691813ce1e81a9a"}, @generic="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", @generic="7c7e24c0dced9e9dee39caa957ee38e4621fcb95eaeacaa229f83d1e3f6be00a2343ccb1cd09ff2af8186b0e386202c51744779ae429f76f06fb3c35ff9b51ae64bdc5f867e9e0f494df135f41d0bb4da8f90a386c1a1e2f69f309fd1d0793976329b1171008584e2eb37471100ac84f23f3c2e0642b95ccc171a09b110869c0d168654620bf9084c6", @generic="bad4920146613446a168a66d38c5fe8cb0f7788d08c67abc6db9b24d"]}, @typed={0x4, 0x96}]}, 0x281c}], 0x1, &(0x7f0000002dc0)=[@rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r1, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x70, 0x4000}, 0x8000) 15:35:18 executing program 0: mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x88040, &(0x7f0000000480)={'trans=unix,', {[{@cache_none='cache=none'}, {@nodevmap='nodevmap'}], [{@obj_role={'obj_role', 0x3d, '!keyring'}}, {@smackfsroot={'smackfsroot', 0x3d, 'cpuset$vboxnet1keyringmime_type'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname', 0x3d, '\\'}}, {@fsname={'fsname', 0x3d, 'net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={[{@discard_size={'discard'}}, {@grpquota='grpquota'}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_lt={'uid<', r0}}, {@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'discard'}}, {@fowner_lt={'fowner<', r0}}, {@obj_type={'obj_type', 0x3d, '/'}}, {@measure='measure'}, {@measure='measure'}]}) getresuid(0x0, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="447bbca8ba83beac8479431d60c33dcc6b84e6878642d93221592b46967993acd660c466a686161bf4485b6a9cb5a34ee461a52ec5e288b69304ff7602c26e4b8601eb7e191551af3f2d2dc81537fccd7d349558720f6e2ccc4e34425ecb6d209139b44c9b5ad57b1be5411a6cc983d24d5aedcd686a", 0x76, 0x540a}], 0x40082, &(0x7f0000000240)={[{@creator={'creator', 0x3d, "25921495"}}, {@codepage={'codepage', 0x3d, 'cp865'}}, {@session={'session', 0x3d, 0x7}}, {@uid={'uid', 0x3d, r3}}, {@umask={'umask', 0x3d, 0x40}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000500)={0x1, 0x5, 0x465, 0xdd, 'syz0\x00', 0x1}) 15:35:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x400, 0x200000) write$UHID_CREATE(r0, &(0x7f0000000180)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/151, 0x97, 0x9, 0xffffffff, 0x9, 0x3, 0xffff}, 0x120) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = shmget$private(0x0, 0x2000, 0x500, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000500)={@dev, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000780)={@dev, 0x0}, &(0x7f00000007c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000d80)=0xe8) accept$packet(r0, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000e40)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000f00)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005900)=0x92) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000005940)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005a40)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000005b40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000005b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005bc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005c00)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000005d00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000007140)={0x11, 0x0, 0x0}, &(0x7f0000007180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f000000f0c0)=[{{&(0x7f00000071c0)=@nl=@proc, 0x80, &(0x7f0000008380)=[{&(0x7f0000007240)=""/1, 0x1}, {&(0x7f0000007280)=""/52, 0x34}, {&(0x7f00000072c0)=""/4096, 0x1000}, {&(0x7f00000082c0)=""/156, 0x9c}], 0x4, &(0x7f00000083c0)=""/220, 0xdc}, 0xffffffffffffffce}, {{&(0x7f00000084c0)=@nfc, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008540)=""/33, 0x21}, {&(0x7f0000008580)=""/188, 0xbc}, {&(0x7f0000008640)=""/185, 0xb9}, {&(0x7f0000008700)=""/33, 0x21}, {&(0x7f0000008740)=""/20, 0x14}, {&(0x7f0000008780)=""/142, 0x8e}, {&(0x7f0000008840)=""/242, 0xf2}, {&(0x7f0000008940)=""/200, 0xc8}], 0x8}, 0x2}, {{0x0, 0x0, &(0x7f0000009e00)=[{&(0x7f0000008ac0)=""/156, 0x9c}, {&(0x7f0000008b80)=""/4096, 0x1000}, {&(0x7f0000009b80)=""/138, 0x8a}, {&(0x7f0000009c40)=""/120, 0x78}, {&(0x7f0000009cc0)=""/34, 0x22}, {&(0x7f0000009d00)=""/148, 0x94}, {&(0x7f0000009dc0)}], 0x7, &(0x7f0000009e80)=""/41, 0x29}, 0x200000}, {{&(0x7f0000009ec0)=@un=@abs, 0x80, &(0x7f000000a2c0)=[{&(0x7f0000009f40)=""/188, 0xbc}, {&(0x7f000000a000)=""/148, 0x94}, {&(0x7f000000a0c0)=""/241, 0xf1}, {&(0x7f000000a1c0)=""/199, 0xc7}], 0x4, &(0x7f000000a300)=""/32, 0x20}, 0xfb8}, {{&(0x7f000000a340)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a480)=[{&(0x7f000000a3c0)=""/184, 0xb8}], 0x1, &(0x7f000000a4c0)=""/203, 0xcb}, 0x1}, {{0x0, 0x0, &(0x7f000000c7c0)=[{&(0x7f000000a5c0)=""/4096, 0x1000}, {&(0x7f000000b5c0)=""/155, 0x9b}, {&(0x7f000000b680)=""/79, 0x4f}, {&(0x7f000000b700)=""/4096, 0x1000}, {&(0x7f000000c700)=""/59, 0x3b}, {&(0x7f000000c740)=""/82, 0x52}], 0x6, &(0x7f000000c840)=""/34, 0x22}, 0x3}, {{0x0, 0x0, &(0x7f000000cb00)=[{&(0x7f000000c880)=""/143, 0x8f}, {&(0x7f000000c940)=""/249, 0xf9}, {&(0x7f000000ca40)=""/147, 0x93}], 0x3, &(0x7f000000cb40)=""/180, 0xb4}, 0x4b3c}, {{0x0, 0x0, &(0x7f000000cc40)=[{&(0x7f000000cc00)=""/31, 0x1f}], 0x1}, 0x4}, {{&(0x7f000000cc80)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f000000ce00)=[{&(0x7f000000cd00)=""/231, 0xe7}, {&(0x7f000000d000)=""/4096, 0x1000}], 0x2, &(0x7f000000ce40)=""/185, 0xb9}, 0x1}, {{0x0, 0x0, &(0x7f000000f000)=[{&(0x7f000000e000)=""/4096, 0x1000}], 0x1, &(0x7f000000f040)=""/90, 0x5a}, 0x2}], 0xa, 0x0, &(0x7f000000f340)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000f440)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f000000f540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000f640)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f000000f740)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000f880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f8c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000f9c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000fa00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000fa40)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f000000fb40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000fc40)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@empty}}, &(0x7f000000fd40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000fd80)={{{@in6=@mcast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f000000fe80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000fec0)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000010a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10c}, 0xc, &(0x7f0000010a00)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="e40a0000", @ANYRES16=r1, @ANYBLOB="000329bd7000fedbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="6402020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400050000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="74000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000044000400000008e07f000000a50802fe06000000000100f80300000005000703ff0f0000010000c7040000000100010601000000070008070100000000007f020000ffff40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400a409000008000600", @ANYRES32=r8, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r9, @ANYBLOB="9801020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000100000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004008403000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000180000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f3d2000008000100", @ANYRES32=r11, @ANYBLOB="3c02020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ff0f000008000600", @ANYRES32=r12, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400010000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="84000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000540004000900030002000000e10be806e208000001000004ffffffff910e3e00ff00000000003b012000000006001feaff7f000040000700070000000100000380000000040006010300000007000104000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r17, @ANYBLOB="7c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b0000000800040000e00f0008000600", @ANYRES32=r18, @ANYBLOB="08000100", @ANYRES32=r19, @ANYBLOB="8001020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r20, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="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", @ANYRES32=r22, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="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", @ANYRES32=r24, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r25, @ANYBLOB="c000020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r26, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r27, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r28, @ANYBLOB="08000100", @ANYRES32=r29, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004007400000008000600", @ANYRES32=r30], 0xae4}, 0x1, 0x0, 0x0, 0x80}, 0x4010) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85a97eca1349f6fc28afb67ea7d7c861c8cb7f4014ab6211090000202000020000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 15:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x8000000004) ftruncate(r1, 0x1000000) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000100)={"bed4a709fd574993c3e8ad6d2d2f8c750f1d18d1b7494cb82a04ef4696951784dbc3d658b68c8beaf352e647109877def811e069505b8423fd997b3a5bad8bf166f306693bcff27f173f181da5ab2c14552f508ee64fd3fca47ef2aec73db441bf44e1640d969519c3228c145f6e98a75f6859af1fcf072126ef6dfc8da754d96a6f1592e56c8530a2391c75d49ec5f74298ade63112a2849855038e98a7d2115cd261c3977bb8a7bfcb1dac836e2842420439f414c287dfc1fec3c85fe66b3162b5021b2b25d68685dff8ef2b240f35768bd43756f8f808b4ca85b8ad45f1f173b748276f6d80249069515d587bbee96af4087add4457090e5b986a33b9e5068c64f758aff19e3862b412c07592932e004e5232de06f068c8948843033091a645bbe40e91fbcc00a41b8dfe6a47882b6eb37b5b6e3fa5ab315a8ecf7bb5446c0cd46f7428e42333ee39546a1b428b00210c3a1518b716b64ab22d79784dac578ed136fbe59f71455e1642ad3e8e5294c9c407e358a17549653386d1024bf17557174153be0c71aad1639ad6155dc8b03be0a50a5b2295de8f16e243f9b0cefee029611ab72d0c760023ebe0a3d67a55da2f097273d948139395ab28b6ac2c56a7ad19895d29599a284461b8c06a96f0091274fd24fa4af60e552156fcb918fa519a3b3be27ebfc3af6562abf1046119df5a09e98596c0659cee17943a216c5ac1aed740277bbe382c4e28f942f5d99b4bab97e3496b9536430b12afc4f7d41754118f0b6010be326492a8aa1e1b62285c4cb97b3006ffab595208aa264147ab0aaa7dc0ad7513b4339f9b083b450818d0ceed7cb0ef0f785612bf0d2ef6a249d5c816386c614bda9ff81f5ba905c2bb74a7a2ed4532589c494e5dd94356132e58a01cbd6fe38c689b4c7b966a7929ea87388091ae43306e434d9df683a04e2fa4414ae1d94da1ac1ea83388ee25c4232e31b847698a29b0f4f3d2b21e58173a99bc93170908f30c351faa0b974f548cbf005c3958644a7f8a9541ef5f1544005f1fa45969a92bed2f2acbf5f5c2b05b93ff816d4d84025818b2f4fb52c316bdeb401ea1653e3d7f30ba9a9b026364ae5ffaa2eb02ae5b7f37f01788dfae273c504ec6c2091ff21b163bfb3ed3d32c4aa22949e604581972fcea4a55ef0f0dd5dfa47328e9b12b9014abb06125e42bb1a012245a04047e220fcc0acec1214c947dc7269c6d4f28712d69d2359fc125a39827faf43e5dca136e283c228b3aab077758b534e81132fdb8d74cc721cb8181e2d4fb8bfd158fbec32a1bf64caee535bff7aca876d1761fa897b8b9390ea1703bdf566299f004ec5e4c21acd69a7c53f5642c9de7dbd088c637a1114171ede1fea0a0ebb87e51583fbbf1ac5689c4aca301531b46ca0e1ce3246c564c28c57fe1042aff7bfe88bb03126dc4a5c4c091"}) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) 15:35:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="150800000000000000bdeca18ec265d4bb3f67781d375c000100000000000000070000060069620000000000000000000000000000fce2000000000000000000000000000000000000000000000000000000000000000000f2df59af97b2a62b045e6e4ca42b670000000000"], 0x68}}, 0x0) 15:35:19 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6(0xa, 0x3, 0x84) socket(0x40000000000001e, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000000)={0x29, 0x1}) connect$inet6(r0, &(0x7f0000000080), 0x1c) epoll_create1(0x0) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 15:35:20 executing program 0: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x80800) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x46, 0x0, 0xffffffffffffff97, 0x0, 0xfffffe49}}], 0x1, 0xfffffffffffffffd, 0x0) fcntl$notify(r0, 0x402, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc3f96487908d9281d70") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e22, 0x3603dd4f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x2}}, 0x501, 0xbf, 0x9, 0xffffffff, 0x40}, 0x98) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) getegid() ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") accept4$x25(r1, 0x0, &(0x7f0000000040), 0x800) ioctl$SIOCRSSCAUSE(r1, 0x89e1, 0x0) 15:35:21 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000240)={0x0, 0xa}) clock_gettime(0x0, &(0x7f0000007d00)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000007b80)=[{{&(0x7f0000000000)=@vsock, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)=""/234, 0xea}, {&(0x7f0000000180)=""/21, 0x15}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000380)=""/126, 0x7e}, {&(0x7f0000000400)=""/100, 0x64}], 0x6, &(0x7f0000000200)=""/28, 0x1c}, 0x2}, {{&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000580)=""/169, 0xa9}, {&(0x7f0000000640)=""/127, 0x7f}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/119, 0x77}, {&(0x7f0000001780)=""/214, 0xd6}, {&(0x7f0000001880)=""/171, 0xab}], 0x7, &(0x7f00000019c0)=""/4096, 0x1000}, 0xb4}, {{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f00000029c0)}, {&(0x7f0000002a00)=""/24, 0x18}, {&(0x7f0000002a40)=""/115, 0x73}, {&(0x7f0000002ac0)=""/180, 0xb4}, {&(0x7f0000002b80)=""/91, 0x5b}, {&(0x7f0000002c00)=""/143, 0x8f}, {&(0x7f0000002cc0)=""/22, 0x16}], 0x7}, 0x5}, {{&(0x7f0000002d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003100)=[{&(0x7f0000002e00)=""/140, 0x8c}, {&(0x7f0000002ec0)=""/129, 0x81}, {&(0x7f0000002f80)=""/104, 0x68}, {&(0x7f0000003000)=""/43, 0x2b}, {&(0x7f0000003040)=""/168, 0xa8}], 0x5}, 0x1494f238}, {{&(0x7f0000003180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000045c0)=[{&(0x7f0000003200)=""/133, 0x85}, {&(0x7f00000032c0)=""/50, 0x32}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/88, 0x58}, {&(0x7f0000004380)=""/82, 0x52}, {&(0x7f0000004400)=""/196, 0xc4}, {&(0x7f0000004500)=""/163, 0xa3}], 0x7, &(0x7f0000004640)=""/202, 0xca}, 0x7}, {{&(0x7f0000004740)=@nfc, 0x80, &(0x7f0000007a00)=[{&(0x7f00000047c0)=""/4096, 0x1000}, {&(0x7f00000057c0)=""/16, 0x10}, {&(0x7f0000005800)=""/84, 0x54}, {&(0x7f0000005880)=""/4096, 0x1000}, {&(0x7f0000006880)=""/16, 0x10}, {&(0x7f00000068c0)=""/231, 0xe7}, {&(0x7f00000069c0)=""/4096, 0x1000}, {&(0x7f00000079c0)=""/38, 0x26}], 0x8, &(0x7f0000007a80)=""/228, 0xe4}, 0x8}], 0x6, 0x40, &(0x7f0000007d40)={r1, r2+10000000}) pipe2(&(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat$cgroup_ro(r3, &(0x7f0000007d80)='cpuset.effective_mems\x00', 0x0, 0x0) 15:35:21 executing program 5: syz_emit_ethernet(0x26, &(0x7f0000000040)={@remote, @remote, [{[{0x9100, 0x3b3, 0x2, 0x3}], {0x8100, 0xaa81, 0xe87}}], {@can={0xc, {{0x0, 0x0, 0x1000, 0xfffffffffffffe01}, 0x1, 0x3, 0x0, 0x0, "5ec379017a8555d7"}}}}, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e21, 0x8, @local, 0x5}, {0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x101}, 0x4, [0x1, 0x1, 0x3ff, 0x100000001, 0x23b0, 0xe62f, 0x3a3bc000000000, 0x6]}, 0x5c) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0x81, [{0x1, 0x0, 0x4b7ad9f0}, {0x8, 0x0, 0x2}, {0x6, 0x0, 0xfffffffffffffffb}, {0x3, 0x0, 0x84}]}) [ 798.401604] kauditd_printk_skb: 207 callbacks suppressed [ 798.401614] audit: type=1400 audit(1556724921.329:17079): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 798.533870] audit: type=1400 audit(1556724921.339:17080): avc: denied { map } for pid=23125 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff1b, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}}, 0x48) 15:35:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0x5, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x1, 0x2d2440) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x8000, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x4c, r1, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x401}, @NBD_ATTR_INDEX={0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x100}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2fbeef6fddac7fc2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) fstatfs(r0, 0x0) 15:35:21 executing program 0: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="8887016f10e6d99d3fbeba7b34e7d0ba087df6818c0d005c08616c708a05272817c8a03554205e4b5e0b", 0x2a, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a30a9bd5a28e297e8bbb98d42ce8f3a8403b7494792f65359363c641532d3b2a45288abdb3d957ccd5ea5ed499599d6e140a801dec8170af7f10346520a507ca2b3a5e68e3b9d811b361caa004c94ce4d29ace4981f38511a47bf6fb5f097016b26e1d6db7c759a1ae7abedd544cdf94a664491672e98bfdec5edf48dd32d999d9bd29a281db9de664e5a0faaf2c0b99aeaf00f7a480ffd0e4", 0x99, 0xfffffffffffffffb) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000280)=@chain={'key_or_keyring:', r1, ':chain\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x8002, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000480)=""/92) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x1, 0x1000}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000140)={0x80, r3}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000080)='./file0\x00', 0x1124, 0x0) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x282, 0xfffffffffffffffa) fcntl$setstatus(r5, 0x4, 0x3fffc) read(r5, &(0x7f0000000100)=""/7, 0x7) ioctl$TCXONC(r1, 0x540a, 0xffff) write$binfmt_aout(r5, &(0x7f0000000480)=ANY=[@ANYBLOB="2f9ed9acf3a598ad4e36eebea068aeabb452137be7910bbe391ac5c2dc399fbc2245bc592341c51171ab7342199844bd67f526b2831c352fbbbdf79f9600"/84], 0x1) accept4$netrom(r2, &(0x7f0000000180)={{0x3, @rose}, [@rose, @netrom, @bcast, @remote, @null, @remote, @default, @default]}, &(0x7f0000000200)=0x48, 0x800) [ 799.653248] audit: type=1400 audit(1556724921.399:17086): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 799.677493] protocol 88fb is buggy, dev hsr_slave_0 [ 799.677546] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c40a2b7b294b97a49c0b9a76240ac2fb2283b542f74d77d0d9ee5d31701130ab2af6e8484dd4efe9c11540f7d67a4"]) mount(0x0, &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400400, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000200)=0x436, 0x4) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) mkdir(&(0x7f0000000300)='./file0\x00', 0x2) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x5c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x44) write$P9_RWALK(r2, &(0x7f00000004c0)={0x9, 0x6f, 0x1, {0xb3, [{0x8, 0x0, 0x5}, {0x42, 0x0, 0x4}, {0x1, 0x1, 0x8}, {0x0, 0x1, 0x3}, {0x80, 0x1}]}}, 0x9) [ 799.906517] protocol 88fb is buggy, dev hsr_slave_0 [ 799.912203] protocol 88fb is buggy, dev hsr_slave_1 15:35:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4200) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x6, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)={0x0, r2}) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x80000000, 0x20183) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="6dfeffff2000ff0a0000000000000000040000006d696d655f74797065766d6e6574312e706f7369785f61636c5f6163636573737b79216608058b29f15763b3d6cbbe2e76626f786e657430"], 0x9d}}, 0x0) [ 800.011002] audit: type=1400 audit(1556724921.429:17087): avc: denied { map } for pid=23125 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 800.188554] audit: type=1400 audit(1556724921.439:17088): avc: denied { map } for pid=23122 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:23 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x141480) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) read$alg(r1, &(0x7f0000000040)=""/133, 0x85) 15:35:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=@srh, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6gretap0\x00', 0x0}) sendto$packet(r2, &(0x7f00000000c0)="3028336d5b4605f2aabc2846474c21005c949929bf027f4beafc255ee2fcda5a4175534b07946d837ba44198ae8b89cca763d669de", 0x35, 0x800, &(0x7f0000000180)={0x11, 0xf6, r3, 0x1, 0x1a, 0x6, @dev={[], 0x10}}, 0x14) socket$inet6(0xa, 0x6, 0xfffffffffffffffa) 15:35:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0xfffffffffffffbff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, &(0x7f0000000140)=0x4) 15:35:23 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x3, 0x4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@broadcast, @broadcast, 0x0, 0x6, [@empty, @multicast2, @loopback, @remote, @broadcast, @empty]}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x8c, 0x18, 0xfa00, {0x0, &(0x7f0000000440), 0x0, 0x0, [0x9c00]}}, 0xfef5) mq_open(0x0, 0x0, 0x80, 0x0) 15:35:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000002c0)={'broute\x00\x00$B\x00', 0x0, 0x0, 0x0, [], 0xa6fc959c1e1280f8, 0x0, 0x0}, &(0x7f00000000c0)=0x78) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000000)="b68f6412529683305a4aac98567aef659e5932bf1e071ed141b027c3b32b03972ff129739a14ed1b09f3c403991ce538b441875ccab37d55cbb867aac1de6707091ebce575866a43d1e9ddaa45ef5a60033b2af3396783757f7d7e", 0x5b) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r2 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000340)="ba5dcf111a7aa42fb8f708bcdd9d9873d72403677fb0e7d5bad123ef41c5bc31d5d2cd5f688a9cac3a18b08b84afcf449ddc0d448eca9b2eb5f513c500dfece12ac70c0eefd122ddbdec25cf5c8576d3a2301665e5bd06b4907168ce5c1985c0ebdd04031c92cf44c62b80e6603a8e6a62d5b75bcce5fd5c237a0607ff89cc9da7000b40610b37360b2507b5ea348c0539873b50bffd45ff64643a5256f9778805285e0be9b32506274bfd052f98815b61bd51679cc26db01ce55e4aa6499f818e405f63bc1ed1042b127fdce653503d204903b19b5bfbc1ac3b", 0xda, 0xfffffffffffffff8) keyctl$unlink(0x9, r2, r3) getegid() ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000100)={0x7ff, 0x1f, 0xff, 0x0, 0x6, 0x40, 0x6, 0x6, 0x6, 0x6, 0xfff, 0x100000001, 0x0, 0x9, 0x8001, 0xba4, 0x100, 0x8641, 0x9}) [ 800.940026] IPVS: ftp: loaded support on port[0] = 21 15:35:23 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x2010400000000019, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x9, "d60700000000000000000032f101000080917149fd661837b011b15f24fc4d12", 0x0, 0x0, 0x0, 0x70effc, 0x100000002}) 15:35:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = dup(r0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000200)={0x2, 0x0, [{0x101000, 0xe9, &(0x7f00000000c0)=""/233}, {0x5000, 0x3c, &(0x7f00000001c0)=""/60}]}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000280)=0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/ip6_tables_matches\x00') preadv(r3, &(0x7f0000000540)=[{&(0x7f0000000500)=""/6}], 0x124, 0x0) 15:35:24 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x413f, 0x0) 15:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80003, 0x51) r1 = socket$inet6(0xa, 0x807, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000040)=0x26, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000002c0)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x381}}], 0x6fdaec, 0x22, 0x0) [ 801.739680] cannot load conntrack support for proto=7 15:35:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 15:35:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, @empty, @remote}, &(0x7f0000000100)=0xc) close(r0) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={@rand_addr="25d131f09409a4fa8ed33a6f75d738d7", @remote, @loopback, 0x9, 0x1, 0x9, 0x400, 0x8, 0x63de50fce1440324, r3}) preadv(r1, &(0x7f00000017c0), 0x23f, 0x0) r4 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) sync_file_range(r0, 0x1, 0x4, 0x2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000002c0)='syzkaller\x00', &(0x7f00000003c0)=@chain={'key_or_keyring:', r5, ':chain\x00'}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x4, @local}, {0xa, 0x4e22, 0x6, @mcast2, 0x100000000}, 0x5, [0x3, 0x7, 0x1, 0x3ff, 0x0, 0x7, 0x414, 0x81]}, 0x5c) 15:35:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000000)=0x60) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d7cfcfc61"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x541a00, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x32, "a292bf2873dd11aca329133283655a2157bb88279dcc228b7f011ca37ef27372c68da87031b827a159f8d0b499ae07e7f7c8"}, &(0x7f00000000c0)=0x3a) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0xca}}}, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="4e000000000000000000000001000000"]}) 15:35:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x8, 0xd) syz_execute_func(&(0x7f0000001200)="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") r1 = dup2(r0, r0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) 15:35:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x1, 0x4) [ 804.022819] bond0: The slave device specified does not support setting the MAC address [ 804.065609] net_ratelimit: 26 callbacks suppressed [ 804.065615] protocol 88fb is buggy, dev hsr_slave_0 [ 804.075722] protocol 88fb is buggy, dev hsr_slave_1 [ 804.115332] audit: type=1400 audit(1556724926.509:17316): avc: denied { map } for pid=23259 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket(0x2, 0x7fc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/36, 0x24) syz_execute_func(&(0x7f00000003c0)="f3410fbdc5cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0f450fbd27a95ff965be3c3b6446ddcb01ef8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f576161787896c401fe5ff6a9c1460000e1b1c482010804f445e22c892a0f0000009f") [ 804.225547] protocol 88fb is buggy, dev hsr_slave_0 [ 804.230811] protocol 88fb is buggy, dev hsr_slave_1 [ 804.305545] protocol 88fb is buggy, dev hsr_slave_0 [ 804.310729] protocol 88fb is buggy, dev hsr_slave_1 [ 804.353600] audit: type=1400 audit(1556724926.559:17317): avc: denied { map } for pid=23259 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x2, 0x0, 0x2, 0x8, 0x7}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x11, r2}) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={0x0, 0x0, 0x80000000000000b3}, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5f, 0x8000) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f00000003c0)=""/244) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000240)={0x0, 0x0, 0xffffffff7fffffff, [], &(0x7f0000000100)=0x6}) 15:35:28 executing program 4: r0 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000040)={0x399f1336, r0}, &(0x7f0000002000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x80000000000}) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r1, 0x0, 0x2) fgetxattr(r1, &(0x7f0000000000)=@known='trusted.overlay.redirect\x00', &(0x7f00000000c0)=""/5, 0x55) ustat(0x6, &(0x7f0000000080)) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000100)={0x34, 0x7fffffff, 0x4}) 15:35:28 executing program 3: 15:35:29 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000180)=0x1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000140)) listen(r1, 0x7) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000200)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) fcntl$setown(r1, 0x8, r4) sendto$inet6(r2, &(0x7f0000000040)="b0a68e3606509d744caf132440ea28787ed3060f3a4e90de81883fd6b9ceb00bc9fa3cee738bc12d57532908331cf2e77bca4792a080d4d5ce5d7be3b596c1dd40c74c0f502c24b168db54c40ab6750229c5b87c", 0x54, 0x40004, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) close(r3) 15:35:29 executing program 2: mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0xa00000, &(0x7f00000000c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@loose='loose'}, {@cache_fscache='cache=fscache'}, {@cache_loose='cache=loose'}, {@uname={'uname', 0x3d, '*cgroup$'}}, {@debug={'debug', 0x3d, 0x2}}, {@access_client='access=client'}, {@access_user='access=user'}, {@debug={'debug', 0x3d, 0x7}}, {@debug={'debug', 0x3d, 0x1ff}}], [{@dont_measure='dont_measure'}]}}) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r0 = geteuid() r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x244000, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) r3 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r4 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x20, 0x101000) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rfkill\x00', 0x4000, 0x0) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000480)='cpu.weight\x00', 0x2, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x100, 0x0) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm_plock\x00', 0x40000, 0x0) r9 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r10 = userfaultfd(0x80000) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x802, 0x0) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000280)="5018d5809b0cc3dd0d088fa7b8b39e077a7f858424ab00ad430b01f654917f0df3a4f69b0e58f491a6328095dcb7b7cc5798fbf623971be0e107dfdf0a4c34a8837ba8c9396af00661f29850b2aafec77be3261d991fa9f65a8fd3126b9c6503c2c074a2f556a3b1cbe7e74e3c790e08097a162198992331419f9300fb67d674793dd6b173f3c4cec2b718e1403cd9f82baf56fe21", 0x95}, {&(0x7f0000000340)}], 0x2, &(0x7f0000000580)=[@rights={0x18, 0x1, 0x1, [r2]}, @rights={0x30, 0x1, 0x1, [r3, r4, r5, r6, r7, r8, r9, r10]}, @rights={0x18, 0x1, 0x1, [r11, r12]}], 0x60, 0x40}, 0x85) setresuid(r0, 0x0, 0x0) setuid(0x0) setuid(r0) 15:35:29 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000100)={@local, @empty=[0x80fe, 0x2, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x73, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x1) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000040)={0xa55b, 0x3, 0x2}) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, '/dev/midi#\x00'}, {}, {0x20, ':\')'}], 0xa, "91fa48d8a2b3835b89ae2c1ed60a2ea9bbcd1a3425bd0c2161c19e64d7d76bd7db7e69ade5f2e9f240f69df1313a407fbeed9fe4b8b32b26e804ee254a2e6b38f794d177f217d304b2b3f7ccbbf1dd"}, 0x6b) fcntl$notify(r0, 0x402, 0x20000001) 15:35:29 executing program 0: r0 = socket$inet(0x2, 0x80800, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0xb93}], 0x1, 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x101000) mq_notify(r1, &(0x7f0000000300)={0x0, 0x23, 0x0, @thr={&(0x7f00000000c0)='*+i', &(0x7f0000000580)="699cc56b40acd95b2404c6d94a33e056f01f9bf3eadc1f8eb20ace21862094a3c8ea09f4ef3740474f8532e63ada2d874c7bc5b1a19df5233cd609295c7bc96a5ce8fb8ddb77936d31033e9b2a11ab69dd4731dd2d7a4a9b0b1440efc316987b3eeaf8962195133c990d81ff506d37e2092cbdc591ba49dc8c2a69843050da1dfd69220fc3943e1594ad1083608e32a0849eff7530c189faabbeab8e0fe171c799fa53e344c322491325524259b7d5b97ae6e5a2dddf82986995ac8407bdf61f8cca1f808766746f890c0484d1ecae8433513e3befd2"}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000004c0)={0x0, 0x6eba, 0x200, 0x9591, 0xfcf, 0x1e}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000540)={r2, 0xb3c}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="410000005895629c0635ff038f33d893eaefa2afe4843944d0151009e79f6315d255e811b3a5e5a9ce177abddfb386a172cdae41f0b8140fae83c32e16a2c3205698d1a77e"], &(0x7f0000000180)=0x49) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e24, @local}}, [0x3, 0x3, 0x3, 0x200, 0xbab, 0x0, 0x7, 0x1, 0x8, 0x1ff, 0x8, 0x2, 0x5, 0xfff, 0x7c8ce43e]}, &(0x7f00000002c0)=0x100) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0}, &(0x7f0000000300)=0xc) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x7fff, 0x6, 0x8, 0x0, 0x2}) ioctl$KVM_SET_CPUID(r0, 0x8008550e, &(0x7f0000000000)=ANY=[]) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0xfffffffffffffffe, 0x3, {0x7, 0x1d, 0xe1, 0x200000, 0x100, 0xfffffffffffffff8, 0x3, 0x8}}, 0x50) 15:35:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x7, 0x1, 0x7e000000000000, 0x0, 0x1000}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}}, 0x84) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x0, 0x0, 0x208000, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000280)={{0x8, 0xbb9f}, 'port1\x00', 0x80, 0x40, 0x2, 0x7, 0x80000001, 0x3f, 0x3f, 0x0, 0x0, 0x7f}) 15:35:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x4000000000000d4, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="dbf38d4efc20867da4006b7f1e18600adc1f77d44fc9aad5123c") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ptype\x00\xee6a\xb0\xaf\xb8\xd3\xcd\xac((\xdcJ\x9fcA\x03\x00\x00\x00\x00\x00\x00\x00\x9c\xf4K8,\n\xc4m\xa8\xc2Pt\xa9x\xd2\xcd\xc7\x0e\x82\xbd`\xc47\x8e\"KL\x0f\xba\\\xf7\xc5\xf4(e\xb1\xe6\xf5\xaa_\xf3\x17\xa7ABR\xd7\x1fW,\xf7\xc3t\xd2\x1b\x06\x00\xad\xaa\x14\x16X\xf0\x99@\x85h\x14\xf4^\xb0\xf1\xa9\xce\x05\x85\r\xdfA\xcf\xa2\xb0\xa1\xf6v0x0, &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(r2, r3, r4) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 15:35:30 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x5398fffb08fec7ed) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 15:35:30 executing program 3: r0 = socket$packet(0x11, 0x151f2789250d6ed0, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000004ffc)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x183483, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000040)=0x8, 0x4) 15:35:30 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x44001}, 0x4080) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000001ec0)='ns/uts\x00') stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) r4 = syz_open_dev$vivid(&(0x7f0000001d80)='/dev/video#\x00', 0x0, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000e000100}, 0xc, &(0x7f0000000b40)={&(0x7f0000000300)={0x828, 0x25, 0x0, 0x70bd27, 0x6, {0x13}, [@nested={0x14c, 0x39, [@typed={0x8, 0x2b, @fd=r0}, @generic="bced17fcc1b7cdd124c26c7afe3145af6ade9db51462c7ed5dcf78d979b97da315801190f10c72b86e6419d79d233d8062f8e9ecb518f343a4d7", @typed={0x8, 0x83, @ipv4=@dev={0xac, 0x14, 0x14, 0xb}}, @generic="232b8e16e766d76eb716ee3a212aff0627157d5077dc73fb52ff42f3670f0535507680f7870fa0cf024cbc6bcc24efffb35d7affad81f34cfe10d57ba2cdd1bf92d63fe2e1c0b9bb416ed5ec9dd0b21e248fcca83f8b111a0813bdd2500e924281de174d341f8adeeeea6ec5ca01d494d87a738254d88da933bcd1472b1f2ca34a2dbb2e59b1bbc10eddf8999f57561de49eb7f0b6e355d8a0078bf277890d7e9087931418ec17bb87297f2db550452fdc27e689b8bbcb273380ed7833d9837a62a365dedd07caa17068210849c82b4d0ee2cd66437a71b54aabf6f0ffd47b517660b908586370c255b26e68070d3cf5f2e4cf8830", @typed={0x8, 0x3f, @uid=r2}]}, @generic="938e83be4dbd3b3a235bd0fac205c63d4b291420c61bed049ec66222458cb6f77f75f6515001739aed968d50405cae5a75c58e5648b398bfff222d36a4e85d78670856512239fc510d00ad6cc2e77baafbbe225577f9086210ff3354ff98743ec16c7807bbf636b46569c50474efdd0f25b9dd714acc673c7ae32b5a507c1fee709b3e", @nested={0x104, 0x61, [@generic="64b682c5f61969d1acc2b7279f2c551a417ea039dd6d9b790967af10052d60f8334e1f614e08ff25fb8eab7d428ab329a8c4e93043841a695432dbcd0e140d5c2457590860a0b1eb541bcda38f6498bccb6296f54ef803065591bd22725b2e82994c2226e1100448b412bafaaa932629a03e2e458aca5ec7b31a96a48c6c7471b8c581c4d332282c5af14e8523bd57917d9fb605a6b736472c7df5aa381b91aaa68e95a3b277b349ea5f4f0589d1f4178e35f8", @generic="16e76bdfa0c088834f7cdd090ce0fd797db14fe3b7e56f6582b1219dd4fbc5496bf4497f3e84fb8653428bdc4ec7a2c97e3ceebec30639c750305aaa3314b890cfc5cc14be6d2f296b26f8c1bc"]}, @typed={0x8, 0x19, @str='fou\x00'}, @nested={0x158, 0x4d, [@typed={0x8, 0x3e, @u32=0x9}, @typed={0x8, 0x5, @str='fou\x00'}, @typed={0x8, 0x5c, @fd=r0}, @generic="8570d4e416d48db2d597aee3968f1cf205f6c3aeb026453f69db0bff237b306c23ae42eca373de80971a6e7dd5defa84adaf4f9c6755be38ead26ccd8522dd1414a2d418b1bfed", @typed={0x8, 0x17, @fd=r0}, @typed={0x4, 0xd}, @typed={0x4, 0x31}, @generic="8ecd0013ae9bd198a45b83d11b5f40544d4f629a01e888f079e934bc579e3b1036cf99ff70988f9f4a37b9eb723f88df316a48ee6dc6e81c8c6458f8e845a1a6411209390b514419f2caf2d6db5451567924ff8bd06fc16b00446784cc36eba3d311c99f5fc912937d0a975a83", @generic="69b0a5089bc0a98b5b15b1988aec811d413fb351aefe053a375682672ca74c3e63e3f6dee3b72d653ff3e9af2133929377f26673e06f23da9d21b991df996b5117d056bb7888a5c99016ec2c93329e4fd14baea24f7cc9100f5889feca7f83023ef2b8fcceb0ea6f55e333797de9", @typed={0x8, 0x3f, @uid=r3}]}, @generic="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", @nested={0x4, 0x13}, @generic="32328e2da8741184bc2d91f8d8789cbbe6a1aaf23edcffe3864d464ac0b6e99d2a3a1b87bf7b621238e7e78e18c5b97a0560c012e72c6fb442277c19218aec2f474ed7be0a2f17fa34d0af8445655dd7c98ab9422416b554000d8938ff6733a047a816500dd1b267352a72ad2bb41d0c1088f8b6a507e5609cf53d8c4f606b3cdf11c3", @generic="ba9a488afa3a093f09c5b212574f48467778b5281a7bbdd7e1e3909399ab4a1f967c885a378e1f0f10d36370029c898b34583335cdc83d4af142b648fe0d011a8a3750aae41f7e0b19eb38c8d6245f1bc5fb79b5854336e73e34bd307fdf2a4b6ed142d15a11ec936d7a27e504dc77acb6734a8878bfce5800e07d770ba23fcd0a4568041cbe15c845414dc3497a593ba6b0d48e783f9a28f466ccf5f934f1085b82e5c540fe468e66d40d801e4e013d6572220fefa467a4cb15b0deb68209688a9e2996817506f596d97e0b", @nested={0x190, 0x1f, [@typed={0x4, 0x6b}, @generic="85343caf83e49525e59ae7bc3aafa1634ef4fa905e5fc99404f8031007219dc5ebd195d7fea788557655c51de07e4de223aeb1766604e6e92436d9f535ee14d3138c85e59f5dcf4ffe7100749ed3ebeac2a32e1fe3e659b2e3ae18f3c72685bd9bea8bb8cec87858891483e3c642c5b6615aa1a0de2f173455362aac02ea3951d3d65ddf0276a4c320557d4fe5d16599b1fe8bdd395beac4dae53c182e4a2662e7fe7bcbd4f31ea2444daf4a79e37a8b175776b202c08ada53d3971af66372b080c9aaed8f29b818fc760cc9f900d3f0b493500ce50048a9d2e1f476f77b6a67352546a5ff9a8da4f3e38076eb91f0d0", @generic="c90c0c39c4b4e2f02d40b001d35cd119bec0ad17eb03c21544565be6dea66fd166ea9e6c55a148ac20a4223eba28076efff11e72b0c074ac4537843abf50d700dc26d66693848e4ff9ee8f03934780867b001f470bffda8ada02be27133b462ccd8db5aedd20b0d8359e1080179edfb03fa8db9cfeb9c80eb5", @typed={0x14, 0x2c, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x8, 0x7d, @ipv4=@dev={0xac, 0x14, 0x14, 0x6670977f}}]}]}, 0x828}, 0x1, 0x0, 0x0, 0x814}, 0x8840) r5 = syz_open_dev$dmmidi(&(0x7f0000000bc0)='/dev/dmmidi#\x00', 0x8, 0x800) r6 = semget(0x0, 0x3, 0x200) semtimedop(r6, &(0x7f0000001dc0)=[{0x0, 0x4, 0x1000}, {0x3, 0xfffffffffffffe00, 0x800}, {0x4, 0x2907, 0x1800}, {0x5, 0xbf, 0x1000}, {0x7, 0xfffffffffffffffe}], 0x5, &(0x7f0000001e00)) bind$llc(r4, &(0x7f0000001e40)={0x1a, 0x336, 0x7, 0x7260, 0x55, 0x6, @dev={[], 0xa}}, 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000c00)={0x0, 0x1000, "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"}, &(0x7f0000001c40)=0x1008) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000001c80)=@assoc_value={r7, 0x2}, 0x8) r8 = request_key(&(0x7f0000001cc0)='rxrpc\x00', &(0x7f0000001d00)={'syz', 0x2}, &(0x7f0000001d40)='/dev/dmmidi#\x00', 0xfffffffffffffffc) ioctl$VIDIOC_G_AUDOUT(r5, 0x80345631, &(0x7f0000001e80)) keyctl$get_persistent(0x16, r3, r8) 15:35:30 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) ioctl(r0, 0x8000000000009375, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', 0x17, 0x2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 15:35:31 executing program 4: r0 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000180)='/dev/sg#\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) connect$netrom(r1, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)={0x3ab, 0x0, 0xe}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9084c7afa35f03fbcece4da6d1f909ae6e7051acbf4f82ef451e1a6fb0ff2d0033069b389c47a7877c9e25e780670300043201158b8946e3cce5768604c07303d4696d5f729a28b79f3504b70c2ccefcb93cc3971a3e6d370a74d3c4032b9f10984248db2ce4869cf448e188c865b352a97e6347272c45c2172131e91f525017c740303cb7534262bb65a1c154e997f5b0de40c0f3c62bd26c1746225985303f7d97f872e7c3dd96e0acc495d5fc9f1871dcd41592794aaf8db94962c2fb2b2879df27201eca38cd8e73bbbad3552296d96b2e53b8d212424a4ff96d9ae76323a426f1c8e510c52d29495b68eb8d28fa381475f7bf1ad3595f2f4e3d8cd233422a7bae060000007126905834d50afc418636ed96af40bcdde5d902543342", @ANYRES16=r3, @ANYBLOB="00002bbd7000fedbdf251100000008000500050000005800030008000100020000001400020079616d300000000000000000000000001400020074756e6c30000000000000000000000008000400010000000800080003000000140002007665746831000000000000000000000008000600ff0000001400010008000400000100000800020087000000"], 0x90}, 0x1, 0x0, 0x0, 0x840}, 0x4004000) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x9, 0x101002) 15:35:31 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x90000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x4a, 0x7fff, 0x40, "0d846a37e5805c7061dcc3b2e52eb7368151cbc656201826a597073407e9cf8d829cedd5a4d48796e5112143d4f7640dacb16a38e740484037cc1228e85b171ec0aec4c2c3bca77ea1ae"}) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000017000/0x18000)=nil, 0x0, 0x194, 0x0, 0x0, 0x296) 15:35:31 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x8, 0x402100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @rand_addr="ce4d69df3423d9fb6e8cbddd0d2595ab", 0x9}, {0xa, 0x4e22, 0x101, @remote, 0x5}, r1, 0x7}}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) lookup_dcookie(0x5, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r2, 0x0) openat$cgroup_type(r2, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+', 0x1}, 0x28, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r5, &(0x7f0000000080)='3yz0\x00', 0x1ff) fchdir(r5) arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) r6 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r6) pipe2$9p(0x0, 0x800) 15:35:31 executing program 0: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x10) setresuid(0x0, 0xfffe, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)) [ 808.560792] kauditd_printk_skb: 207 callbacks suppressed [ 808.560802] audit: type=1400 audit(1556724931.489:17530): avc: denied { map } for pid=23384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x9) ioctl$GIO_FONT(r0, 0x540b, 0x0) 15:35:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000380)=ANY=[@ANYBLOB="bc0000007800000054f72708e00d143341a08dd7194ab1db449a68561cb2105ed1f45e96dbbef1215cde486d2337f0c15f149e7b6f6538577c97ff36cbba801ae0b2424264673240445d2f3e9aa383d5f018bd3b85e4287ba5eab70993770a08d1cc709de28322709e4342a225948fc04e5ff3c06b462e0f257061acee84e9b397b6e168dd3f00e27634ad5ab6"]) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\'', 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, 0x0) mount$9p_rdma(&(0x7f0000000300)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1000008, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d30783030303030303030303030303465add325cf713d3078303030303030303030303030303030392c646f6e745f686173682c61707072616973655f747970653d696d617369672c00"]) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, 0x0) connect$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x0, 0x2, 0x5, 0x8, 0x100, "3d1aa85a4adea919e7bfcee93dfcc8a105bcdad7dab25e33d4ee6d4b0d8de8bea247feac3f4b8ad73a0fe02e9f049366a4830c96d5c10e291a4f5cd331c3c7", 0x1}, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x3, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) eventfd(0x8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0xff, @loopback, 0x8000}, 0x1c) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x3, 0x100000000}) [ 808.795664] audit: type=1400 audit(1556724931.499:17531): avc: denied { map } for pid=23384 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:31 executing program 4: r0 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000180)='/dev/sg#\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) connect$netrom(r1, &(0x7f0000000100)={{0x3, @bcast, 0x3}, [@null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)={0x3ab, 0x0, 0xe}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="00002bbd7000fedbdf251100000008000500050000005800030008000100020000001400020079616d300000000000000000000000001400020074756e6c30000000000000000000000008000400010000000800080003000000140002007665746831000000000000000000000008000600ff0000001400010008000400000100000800020087000000"], 0x90}, 0x1, 0x0, 0x0, 0x840}, 0x4004000) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x9, 0x101002) [ 808.935539] audit: type=1400 audit(1556724931.769:17532): avc: denied { create } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:31 executing program 2: 15:35:32 executing program 0: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$packet(0x11, 0x40000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r4, &(0x7f0000000380), 0xfffffffe) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@nfc={0x27, 0x9}, 0x80, 0x0}, 0x0) [ 809.101189] audit: type=1400 audit(1556724931.769:17533): avc: denied { write } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001400199009004b0101048c590a880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) 15:35:32 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x1420, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x20000000002, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x0, &(0x7f0000000000)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}]}}) [ 809.336164] audit: type=1400 audit(1556724931.769:17534): avc: denied { read } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 809.366529] net_ratelimit: 24 callbacks suppressed [ 809.366663] protocol 88fb is buggy, dev hsr_slave_0 [ 809.378809] protocol 88fb is buggy, dev hsr_slave_1 [ 809.425589] protocol 88fb is buggy, dev hsr_slave_0 [ 809.431035] protocol 88fb is buggy, dev hsr_slave_1 [ 809.478273] audit: type=1400 audit(1556724931.819:17535): avc: denied { create } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 809.671276] audit: type=1400 audit(1556724931.819:17536): avc: denied { write } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:35:32 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x65) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xd, "df3e07b477738555f62ab5bfe3"}, &(0x7f0000000140)=0x15) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e22, 0xfff, @ipv4={[], [], @multicast2}, 0x80000001}}, 0x8, 0x1, 0x4, 0x80, 0x80}, 0x98) clone(0x80041fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() sendmsg$tipc(r0, &(0x7f0000000500)={&(0x7f0000000240)=@name={0x1e, 0x2, 0x1, {{0x42, 0x1}, 0x2}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000280)="fec868a8cdd38f87", 0x8}, {&(0x7f00000002c0)="a05e4d6d425d35251490a7f4cf85ac843bf41ab8d7092fb4fc39591cfbbfc847a2c26f563f2aa8fb458356375945ae846568401b522221efef6fcfcc6ed0d806c7de9b2eb32eaa104ad16892f39c74c057ef49f05cf7ea2db1f72e47257f8ce7916cbe681d57fbd87b667f8e6f6a25ed00f4bf0c22503851686f0395c3e158393e40e0b19f6add31b4e7e54af6be215675b27e17c311a3ff510b4fdc5c99", 0x9e}, {&(0x7f0000000380)="7345b9d97740717d7d2b4e70d24e327026a59e552df0fd8f38b981168f7faf7d6a1f516762d22d44fd398c6045294c6ca894a5a4b62da35c9d21df07826d55caf871f867a7ede1f261d5b49478623dce93ce5acef9fc15e5376bdd5348a73756d3b20f2c96e4f122c66aa697dbbbbf6ecf912fe4267ed9af73d1d368e499d5959fde2fdcde06547f0879335d758c652ce8952481b52fdc110422b0a4517fc2243cadf68c10a2ba73991db0067ae793877b8614920caf6b5be7e1f00c372ba388861c532f2e934877be7b987f0affe857f248821a0386b20ffcb84a55c58a3d14a68cc6412a3907dfea0cf16a68b5e0cf245202f5", 0xf4}], 0x3, &(0x7f00000004c0)="61994f83ddfe6a97ad7e9040ab6cbb1d11ba139f1f56c1ff9521b42b4e9aca39b0f1d4570a47b40fe309f9a2a1ee88baaba9be062837da9af96647813bdbea", 0x3f, 0x4000}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c523f319bd070") rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) r4 = add_key(&(0x7f0000000600)='rxrpc_s\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000540)='rxrpc_s\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="1971aa0a1384afc2b8a10c7f0b221f0931d7830cfb28d6b7df9b262de0c6390cd1756524ce82095cca076fc4a4fb6af0c0184350d212c3ca28", 0x39, r4) ptrace$setregset(0x420c, r2, 0x0, 0x0) [ 809.825822] protocol 88fb is buggy, dev hsr_slave_0 [ 809.831148] protocol 88fb is buggy, dev hsr_slave_1 15:35:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x1, 0x80000001}}, 0x28) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) bind$alg(r3, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast5)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@generic={0x0, "39e2973127f5e3a1a5bfbb1ecaa5a46d4b5826bf3e29477aa83b930341931a1f25ab76245a960d63ad1c467c83c9e842abeb59bd851ff437263884dd641efc7cddeb22ac78ffe364d71d64ba2419fa41dcfd4ecc737cbc4d7712913083867f23221c0d0caea62d07f72e8ec980a45d10c57b55425bc426b453d4038d7526"}, 0x80, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x101000, 0x0) [ 809.867297] audit: type=1400 audit(1556724931.819:17537): avc: denied { read } for pid=23395 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 810.065572] protocol 88fb is buggy, dev hsr_slave_0 [ 810.070754] protocol 88fb is buggy, dev hsr_slave_1 15:35:33 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x23) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt(r0, 0x9, 0xffffffff, &(0x7f0000000000)="939365d0055324053bd73056220e989427b736802ac1fd110346c5331d486e4412d5968df496bd8b590bdd0ca52ebe31abac0238d6841fdc77ac3230396dc9ecacdc6b850e15bcfdd8f95b199a54525d114537f356410c2d59524d0e722ee029497ccf5dd37396c6c9a300dbbc5466df74ce80502a99c2ffecc6c61d559daccddcca118c0ef851faebe6288a2e4c", 0x8e) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x3f, 0x2) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 810.105388] audit: type=1400 audit(1556724932.019:17538): avc: denied { map } for pid=23404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:33 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/932], 0x3a1) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/policy\x00', 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000680)) exit_group(0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000150007041dfffd946f6105000af000001f00000c0c000800080006000400ff7e", 0x24}], 0x1}, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000240)='ns/net\x00', 0x7) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000100)=0x13000) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/net\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{0x100, 0xffffffffffff0001}, 'port0\x00', 0x20, 0x420, 0xfffffffffffffffe, 0x285, 0x80000000, 0x1, 0x2fd02678, 0x0, 0x0, 0x20}) [ 810.222719] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.299807] audit: type=1400 audit(1556724932.019:17539): avc: denied { map } for pid=23404 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 810.322129] protocol 88fb is buggy, dev hsr_slave_0 [ 810.322179] protocol 88fb is buggy, dev hsr_slave_1 15:35:33 executing program 2: unshare(0x400400fd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="23b6f555794b884728a404ac1888f1d5e8c871c731c4fb03dcb175b9bb6697a33ff45c5fe28f82d1db77574852a2abc74988adc2fecb3665341190044af0a654", 0x40, 0xfffffffffffffff9) keyctl$update(0x2, r0, &(0x7f00000000c0)="7ac1436e7dbe6b520530a084ac13a8f48decf79e565ae09dda882bd81db24b59df932c06e72dbdfd3f0b26271631b83f603e7cf847a9cef02b49dbf356f7be406d9f5f61751b7bab06b15e6c90d2443662e23956c8bb098b201dbc295d301eeeb99ee0ba0ee4efc4edfcef34351e37ce7bf46e3ba1fd29aa5156c7b56fd3dfaff755b8bb4edf847536e4db8a0f05a8510441943c2dc1d7f577c9f16e854056bfaa798390d34b027a4c80d53f4f63bcbaaf2fc7002ed687", 0xb7) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 15:35:33 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') exit(0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000240)=0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1f, 0x0, 0x5}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r2, 0x0, 0x5, 0x9, 0x7, 0x1}, 0x14) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0x8, @local, 0x20}}}, 0x84) 15:35:33 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xfffffd95) clone(0x180000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.u\xe0per\x00', 0x0, 0x0, 0x0) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000040)='trusted.overlay.u\xe0per\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x40000, &(0x7f0000000300)={'trans=virtio,', {[{@afid={'afid', 0x3d, 0x8}}, {@posixacl='posixacl'}], [{@subj_type={'subj_type', 0x3d, 'trusted.overlay.u\xe0per\x00'}}, {@uid_gt={'uid>', r1}}]}}) [ 810.929783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16381 sclass=netlink_route_socket pig=23444 comm=syz-executor.3 15:35:33 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x18, 0x29, 0x39, "21020201"}], 0x18}, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000)=""/26, &(0x7f0000000040)=0x1a) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x1364, 0x4, 0x8000}, 0x4) dup(r0) 15:35:34 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2c6c6f7765336469723d2e3a66696c653044950f8e510676d31bd262b36297fb0438ede4ae7e8a40ebca3edd9f0fd05816d86210c76f2c534b4eef8c1d8dc1945fbdf5a8d6f6f8447fe411e00be093f49800c5179a26dc7734cd091b7350dc2ee4d8e993155dda7640174292d83612e9039425c9ba0ded3595325682e3d34103afabd5553f"]) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x200c28, 0x0) [ 811.095062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16381 sclass=netlink_route_socket pig=23444 comm=syz-executor.3 15:35:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xff5, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffbfffbfac, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f00000001c0)={0xe, @output={0x1000, 0x1, {0x9, 0x1}, 0xb103, 0xfffffffffffffffe}}) sendto$packet(r3, &(0x7f00000002c0)="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", 0x1000, 0x4000000, &(0x7f0000000140)={0x11, 0x17, r2, 0x1, 0x100000000, 0x6, @broadcast}, 0x14) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'team_slave_1\x00', r2}) 15:35:34 executing program 3: syz_execute_func(&(0x7f0000000040)="982ced0f050520d0f80791b0024141e2e9964180bf108a6796fbc4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b0000006eba0dfe8c738888a1c40fbbc4e201acac100000ad808f294001b00b000000f08171a38a806ebb15c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4e7ae3131b15dfba1c9fb110f0f3804830a000000") ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x0, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000100)={0x0, 0x4, 0x9}) 15:35:34 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000001, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000000, 0x10000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7, 0x30}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @remote}}, [0x6cca, 0x400, 0x7, 0x4, 0xfffffffffffffff7, 0xff, 0x6, 0x7ff, 0x39, 0x80000000, 0x4, 0x7fff, 0x4, 0x0, 0x10001]}, &(0x7f0000000200)=0x100) r2 = socket$inet6_sctp(0xa, 0x2001, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x1e, &(0x7f0000000000), 0x4) 15:35:34 executing program 0: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) r0 = syz_open_dev$binder(0x0, 0x0, 0x3fffffffffffd) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x3, 0x101200) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000100)) 15:35:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup(r2) accept(r3, &(0x7f00000002c0)=@l2, &(0x7f0000000080)=0x80) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3180d070") listen(r4, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = accept(r4, 0x0, 0x0) sendto$inet6(r6, &(0x7f0000000780), 0xffffffffffffffe6, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, 0x0) r7 = syz_open_pts(r1, 0x0) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000040)={0xd35c, 0x0, 0x0, 0xff}) ioctl$TCSETSF(r7, 0x5412, &(0x7f00000000c0)) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000100)={0x8c3c, 0xf346, 0x8, 0x1, 0x4, 0x0, 0x591, 0x1f, 0xb28, 0x3, 0xc2e6, 0x3f, 0x3, 0x8000, &(0x7f0000000200)=""/177, 0x8000000000000, 0xfffffffffffffff7, 0x1ff}) getsockopt$ARPT_SO_GET_INFO(r6, 0x0, 0x60, &(0x7f0000000340)={'filter\x00'}, &(0x7f00000003c0)=0x44) [ 811.654144] overlayfs: unrecognized mount option "lowe3dir=.:file0D•ŽQvÓÒb³b—û8íä®~Š@ëÊ>ÝŸÐXØbÇo" or missing value 15:35:34 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) lookup_dcookie(0x5, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) mkdirat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x1ff) sendmsg$key(r2, 0x0, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xffffffffffffffd3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000003c0)={0xffff, 0x8, 0x0, 'queue0\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, 0x0, 0xc0f7) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000200)={'ipddp0\x00', {0x2, 0x4e22, @broadcast}}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x80000000}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) fchdir(r4) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') timer_create(0x7, &(0x7f0000000240)={0x0, 0x35, 0x3, @thr={&(0x7f0000000540)="2ab14e4b31472325e78639795e9ab5b0267fd844ff16a3efc63bfc8999cf856f6002ed116145f771d63baecfb1e5fe65add3131f81b646a5e7285a113ebca50448caca7153e6209e71d15dc2534f1be6aaef8b570c003f19995ea20b8b1b09b70b3cfc1a5c9b3de3cc3c8137680177aceb61077ab9363c9bafaa41e382d74f0e8d6cf53f470079c528174b2e8f091085186185177e69b95f35c98ce76724f5e3751ee88a3b2d2dfe524aa709adb8f1a9a4fc7e16c866be34fadc8221d0f0d6ed627fe2d5577e7f916fb843b6b412868703784e4cb8ed458bbeb7d5320e73b39ad3587309c9c2bb6ca5fb038d6d6d3284807bbd46b3b53747", &(0x7f0000000700)="31ce644e9ef87feb5ff08cea2f283c6a29a3f1208d469a41fecb4d12b72d533c7bce744ebaf4ed6671f40fba2f546027da7ddb2d7a54e546728bd55098cd2b0760b6ef67dcf1fcfa7bdbdefc97eeafb036c197da4d267c7c19ab2a8b23d9f63cbee85bd310571e997c4bdf6ae57ac0d871c70e7fe12c63011849fec6b411cb3f4c50b4649cdf945fc19522535fa5ecd38066d2222b211a5d72b0fc90df47f33cffefe3e9fe0e26af9cc1951e6b6de12ddf9e9fe4d842b3effd24eda4bb73b3869c1e6f26bda0bceb21ea81205c56c4cc1714e799996e6d44284b25f12a742a3983b0d860a092eb38"}}, &(0x7f0000000300)=0x0) timer_gettime(r5, &(0x7f0000000800)) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) umount2(&(0x7f0000000280)='./file0\x00', 0x0) r6 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r6) pipe2$9p(0x0, 0x0) [ 811.772631] overlayfs: unrecognized mount option "lowe3dir=.:file0D•ŽQvÓÒb³b—û8íä®~Š@ëÊ>ÝŸÐXØbÇo" or missing value 15:35:34 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) fstat(0xffffffffffffff9c, &(0x7f0000000340)) lstat(0x0, &(0x7f0000000880)) lstat(&(0x7f0000000180)='./file0\x00', 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x101200, 0x0) rename(&(0x7f00000003c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x4, 0xffffffff}, @sack_perm, @mss={0x2, 0x91}, @sack_perm, @sack_perm], 0x5) r3 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000700)='+em0ppp1!security/\x00', 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x6, 0x4) lsetxattr$security_selinux(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f00000005c0)='system_u:object_r:src_t:s0\x00', 0x1b, 0x0) 15:35:35 executing program 5: r0 = syz_open_dev$radio(0x0, 0x1, 0x2) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) io_destroy(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = eventfd(0x81) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000002c0)={0x18, 0x0, {0x2, @local, 'team_slave_0\x00'}}, 0x1e) poll(&(0x7f0000000200)=[{r5, 0x1000}, {r4, 0x4000}, {r2, 0x4000}, {r3}, {r2, 0x2}, {r3, 0x2477}, {r6}, {r4, 0x1080}, {r0, 0x6082}], 0x9, 0xfffffffffffffffa) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x80) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000000)={0x9, 0x8}) mmap(&(0x7f000015a000/0x2000)=nil, 0x2000, 0x2000000, 0x40001f, r8, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/128, &(0x7f00000001c0)=0x80) r9 = getpgrp(0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r7, &(0x7f0000000300)={r0, r5, 0x6}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 15:35:35 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000200)=0x8001, &(0x7f0000000240)=0x4) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000080)=0x100000035) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000140)=""/162) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffc, 0x0, 0x20, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x7fffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) init_module(&(0x7f00000002c0)='\x00', 0x1, &(0x7f0000000300)='^%\x00') r1 = inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0x40000002) inotify_rm_watch(r0, r1) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x2) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000000c0)={0x8, 0x7b00, 0x9}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) read$FUSE(r0, &(0x7f0000000500), 0x1000) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) 15:35:35 executing program 1: socket$rxrpc(0x21, 0x2, 0x2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x407e, 0x0) write$eventfd(r0, &(0x7f0000000040)=0x7fff, 0x8) syz_execute_func(&(0x7f0000000400)="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") 15:35:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x8802, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = gettid() r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000000c0)=0x7fffffff, &(0x7f0000000140)=0x4) ptrace$setopts(0x4206, r1, 0xffffffff00000000, 0x100010) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) getpid() setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180)={0x29fe, 0x2, 0x1fe000, 0x5}, 0x8) socket$can_bcm(0x1d, 0x2, 0x2) fallocate(r0, 0x9, 0x8, 0x6) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x1040000) r3 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='/dev/uinput\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000340)={r3, 0x7f, 0x9}, &(0x7f0000000880)={'enc=', 'raw', ' hash=', {'crct10dif-arm64-ce\x00'}}, &(0x7f0000000b00)="e320c62d3fe6546b0a6e4d58919c2bd794dfa9374e1eaa445925ad244595d5c8e6fb1935da4eaac47d6aa6616ae4b2e875ecb21cc94d643d369c2332d0c0166f92e3787afbe872ad79ee494b8cb594e79d426cfd65dc99abc289d4c9c09a680cd22da68aba0fa87ae578af1d0c24f99074d3cc50dec5f81a9f5d762c18c39c110adae2bfb00a712a62abf4e96946e6f0448abc8389d1427b984b0b83e23f964fade0aeab4612061d6bbe87b3e0947c2a8d4ccac5c80301226ec8572511c6537484aea9b56c2245055366c3dbf3c3b477135837dd3aecb4b11ae2", &(0x7f0000000900)=""/132) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1c000020a981ffffffffffffff002227c845297a8e8de415f05aa3243a95b46179e6c051f8b716d7d0501573965d640aead49a67dfdd5030c7ffff44f7461e182ad5c5b4dde483ef9c5cd8a54a7e6ff2e630b59546df5febda333d77ad49dacf5653e8ed3ca47d40b1380b3b7c3f23a1f972e4513dc9b1fbef7730be0efacf09f509144f598d63c8bca454b9ed4a2420f3cd89b7406e27ad560a30fa226542147a9ce311941059ca13ef22396dc4915cbbc0aaeb146209e7b31a798790e39d7e95038bc621ab5b9028439cc87f4ac482743b32cdcbfff248d5c34b7d73b273ed96a66edd5084e46f349fef034e243debd9bac8382108ec15bbc385b78dff26f37ae9a8b64c072438"], 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) write$FUSE_INIT(r2, &(0x7f0000000c00)={0x50, 0xfffffffffffffffe, 0x8, {0x7, 0x1d, 0x80000001, 0x1b3f2e763b254986, 0x0, 0x2d, 0x606, 0x4}}, 0x50) fcntl$setown(r4, 0x8, r1) accept4$rose(r2, &(0x7f0000000100)=@short={0xb, @dev, @netrom}, &(0x7f00000001c0)=0x1c, 0x80800) 15:35:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_cmd={0x0, 0x0, 0xf00}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x10400, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f00000000c0)="9ec8a11ee30ea1d6153c969d5b85e493f53bde5f87290e38764bcf6fded9b8619f843bd2b015177a096cd6c870a5d7582494e20ddb58ac17e2b660b6ee58b040d9afd62a96c7981792d6c0dac3ec809d621fd2ea4fba792f649a67b3b26afb4d2867631ce25bfb018dde9d48971cd0ca7b6eaf4f0a41a468d7a5d4ea39646a0d31c8cbe10df1ac43a407e370a60eb9817d32ca1b", 0x94) 15:35:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x248000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000080)=0x200000000) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) write$P9_RSETATTR(r3, &(0x7f00000003c0)={0x7, 0x1b, 0x2}, 0x7) write$selinux_context(r3, &(0x7f0000000380)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24) connect$caif(r3, &(0x7f0000000100)=@util={0x25, "89280cf64b73891306223e5259c3f01e"}, 0x1dc) ioctl$int_in(r2, 0x40000000af01, 0x0) setrlimit(0xa, &(0x7f0000000880)={0x5e, 0xffffffff7fffffff}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x18, &(0x7f0000000180)='(#vmnet0vmnet0-ppp1]\xc8&)\x00', 0xffffffffffffffff}, 0x30) move_pages(r6, 0x6, &(0x7f0000000280)=[&(0x7f0000001000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x4000)=nil], &(0x7f00000002c0)=[0x401, 0xed8, 0x0, 0x4ea7, 0x4, 0x0, 0x3], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)='nodev^\xd5\x00', 0xfffffffffffffffe) preadv(r2, &(0x7f0000000540)=[{&(0x7f0000000400)=""/243, 0xf3}], 0x1, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000007c0)=ANY=[]) prctl$PR_GET_FP_MODE(0x2e) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000000c0)={0x0, r4}) kexec_load(0x8, 0x1, &(0x7f0000000340)=[{&(0x7f0000000600)="433b662b5c4713695a41a5e5ce50a8ba12eb82a2da65bd4fcdfbdd000511e0231a0ec7e68bedc08d294d1c735047ec07da51906b9e3922a22a7d62bf49f2e58f09b2dfcd0fd8488301c1cdc406690fae52786581dd9dd3c05f410190104ed29acbd22948d894fe04db64111ad6420ff89bacfea35482d3e5113124718e9d69b8201eeb772b9a74ec4f627255a311fbf47d9e805824f8802b20138aa2e39f1d295e244a4cdfc7326a4a52a9db0ea80a888371ebcf12d19ce0ffd85f9e33c695fff3de236ce86700ccdb6b06fe5147a632718dc86cdb6e66f7e5533cb9fd6c401d9b44c599b3ee83183afb53a42028", 0xee, 0x7fffffff, 0x3}], 0xa0000) 15:35:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0004060b4f43a49fe4a5ea4c000016179707fb0f3d2ed90920511c827507000000162d786893c44a2f2a0bd2a268ba000051df6d1e4c6344b8b39ba2f533cdf5424294335b7189c3003b"], 0x3e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) syz_open_pts(r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0xea) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101000, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f00000001c0)=0x1, 0x4) r2 = dup2(r1, r0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xe4f1912819ff9083, 0x0) 15:35:36 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) write(r1, 0x0, 0x17a) 15:35:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) clone(0x400a300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000100), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x10001c) tkill(r2, 0x26) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) 15:35:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x4, 0xfffffffffffffffc) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000004c0)={r1, r1, 0x6, 0x67, &(0x7f0000000440)="b21f5da460dfe6b4adfe020bb2fd6deee2b57319c43bca411cd1848d4cdf53a8ede7bf974d04137502e01f3d6af5835878a0b358cf3cb646b7b98741ee9abfd52abb95145b8c7201afa788ee0cbadd4bdd05c09254b29d1b4e94c690f68a4304c2ec13904747d2", 0xffffffffffffff81, 0x80, 0x3c2, 0x6, 0x401, 0x0, 0x5000000000000000, 'syz1\x00'}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000380)=""/175) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000100)={0x200, 0x1}) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20208}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x0, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000600)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @rand_addr=0xa3}, {0x2, 0x4e23, @loopback}, 0x100, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000180)='bridge0\x00', 0x1000200000000, 0x8, 0x8000}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x40000, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x10, r3, 0x0) ioctl$VHOST_SET_VRING_KICK(r6, 0x4008af20, &(0x7f0000000340)={0x3, r1}) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000580)={0x1, @bcast, @rose={'rose', 0x0}, 0x7f, 'syz0\x00', @bcast, 0x2, 0x2, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, 0x0) [ 813.610331] kauditd_printk_skb: 154 callbacks suppressed [ 813.610341] audit: type=1400 audit(1556724936.539:17694): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={0x0, 0xd7}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={r2, 0xc4, "65d5c663bc907465a1204780987d6e0fb0c9c1d1e9a85c6f060569881c490c4cebcc92670b9ec19bb625f186c1142ca5e431e9f1b0992704960dce8e6e91c03cea87228d1b7f54c8d79f407394fc74867dc5e68f3e0fa658ffe8f6a157a84d1e23914852c74d6ec7d2c52a8d0039aeda3dc8f72152e0992a0b0e6a6f8fbf7374b6ea3936bea91759fce8720637dae4f475f8ec629eea231b21b28715c99b06e62979a181b3c87a8984531657174a5f16e23c36413ba30231fba67e69ccc7ab87c2bcda18"}, &(0x7f00000002c0)=0xcc) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000080)={0x81, 0x100, 0x4, 0x81, 0x1, 0x19, 0xf, "f0c09bf0324e191170f3b3e177dcc73b8800fd11", "6bf6ec8cb059d09b02b0a4b58f4f0bca94ee997d"}) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @broadcast, @empty, @link_local, @empty}}}}, 0x0) ioctl$sock_bt_hci(r1, 0x9ced041bc566e448, &(0x7f0000000100)="a457271dd00697a74eee63f6260563ac8b29c4ea1942c058c98cc15e79011803b76e138390edab0d6280b3336295d4924216ee307401") [ 813.834792] audit: type=1400 audit(1556724936.569:17695): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='&Vcpusetvmnet1\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, r1) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x8, 0x200) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000380)=""/121, &(0x7f0000000400)=0x79) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e00000014000000000000009500000000000080"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) close(r3) [ 814.021557] audit: type=1400 audit(1556724936.579:17696): avc: denied { map } for pid=23517 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:37 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x140205, 0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x5000100) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r0, r2) [ 814.206827] audit: type=1400 audit(1556724936.609:17697): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0xffffffc9) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a91", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a3041859a024217618edc55b89c6033fa80a83e60b1134ea18c7451ca2cf7bb4e90b879d8b2d959a2af6d046b92ed9886a6eb31349511021cb22b3f9aac9e8ef91fc7dd62827fe55f45b8d28d92aa04d579a49e1178ba598fa14f0b2203a01264f35c8554b2acfc1a1ae03fd7c68eb68614984eedcb2bd50dbf9dbff7ff"], 0x80) recvmsg(r1, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0xfffffffffffffd8b}, 0xfffffffffffffffe) [ 814.372326] audit: type=1400 audit(1556724936.609:17698): avc: denied { map } for pid=23512 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 814.465538] net_ratelimit: 26 callbacks suppressed [ 814.465544] protocol 88fb is buggy, dev hsr_slave_0 [ 814.475751] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24040, 0x0) write$rfkill(r1, &(0x7f0000000040)={0xbe, 0x6, 0x3, 0x1}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f123c123f319bd070") ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) bind$ax25(r1, &(0x7f00000000c0)={{0x3, @default, 0x4}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) keyctl$join(0x1, &(0x7f0000000080)={'syz'}) [ 814.537229] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.543534] audit: audit_backlog=65 > audit_backlog_limit=64 [ 814.560953] audit: type=1400 audit(1556724936.629:17699): avc: denied { write } for pid=23509 comm="syz-executor.1" name="net" dev="proc" ino=86824 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 15:35:37 executing program 1: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0xe, 0xfffffffffffffffc, 0x4, 0x0, 0x0, 0xe1cb, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x1, 0x0, 0x104f37, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x4000000000007fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/122, 0x7a) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 814.592875] audit: audit_lost=191 audit_rate_limit=0 audit_backlog_limit=64 [ 814.606885] audit: audit_lost=192 audit_rate_limit=0 audit_backlog_limit=64 [ 814.625579] protocol 88fb is buggy, dev hsr_slave_0 [ 814.630824] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000000)={0x0, 0xfffffffffffffffb, 0x1, 0x7fff}) [ 814.705553] protocol 88fb is buggy, dev hsr_slave_0 [ 814.710701] protocol 88fb is buggy, dev hsr_slave_1 15:35:37 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8000000008b0f, &(0x7f0000000080)={'ip6gre0\x00', @ifru_flags}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2100, 0x0) read$FUSE(r1, &(0x7f00000000c0), 0x1000) 15:35:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r1, 0x0, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'rose0\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x2) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f00000000c0)) listen(r2, 0x40000000000001) setsockopt(r3, 0x0, 0x4, 0x0, 0x0) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x40000) 15:35:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x48080) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) accept$alg(r1, 0x0, 0x0) 15:35:38 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)={0x1, 0x0, [{0x6000, 0xfd, &(0x7f0000000400)=""/253}]}) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[]) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000140), &(0x7f00000001c0)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f00000003c0)=0x3) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0, 0x0}) 15:35:38 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1, 0x0, 0xfffffe6e}, 0x0) 15:35:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x401) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffa}, 0x0, 0x8) gettid() timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r1, &(0x7f0000000080)=""/128, 0xae3f1a6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") [ 815.520544] dlm: non-version read from control device 4096 [ 815.585545] protocol 88fb is buggy, dev hsr_slave_0 [ 815.590708] protocol 88fb is buggy, dev hsr_slave_1 [ 815.617805] dlm: non-version read from control device 4096 15:35:38 executing program 5: [ 815.665589] protocol 88fb is buggy, dev hsr_slave_0 [ 815.670721] protocol 88fb is buggy, dev hsr_slave_1 15:35:38 executing program 2: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000021fe4ac1414", 0xf}], 0x1}, 0x0) 15:35:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000380)={0x80000001, 0x0, 0x0, 0x0, 0x0}) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 15:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 15:35:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd95) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 15:35:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000480)="800f00001000110019000300e6000000ffe00102000000000100000009000000004000000040000080000000000000006d5ebe5a0000fff053ef080603", 0x3d, 0x400}], 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 15:35:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 15:35:39 executing program 1: io_setup(0x400, &(0x7f0000000300)) 15:35:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100), 0x14) 15:35:39 executing program 3: ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x34) 15:35:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') 15:35:39 executing program 0: symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') [ 816.927249] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.079919] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 15:35:40 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4610f6ff000000000000000008030003000000df87000000003800000000000000080000000000200001"], 0x2d) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 817.210803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.292749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.357498] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 5: io_setup(0x80000001, &(0x7f0000000040)) io_setup(0x3a3, &(0x7f00000000c0)) io_setup(0x3, &(0x7f00000002c0)) io_setup(0x80, &(0x7f0000000080)) pause() pause() syz_genetlink_get_family_id$tipc(0x0) syz_execute_func(&(0x7f00000004c0)="3666440f50f564ff0941c3c4e1a570f973f3430fbd91001000009a69000000803a8e16649d635100617b12450faeefc1dff89600c42211c40228f7881d000000421947a800010100") syz_execute_func(&(0x7f00000009c0)="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") [ 817.444461] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 0: syz_execute_func(&(0x7f0000006080)="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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8000000008031, 0xffffffffffffffff, 0x0) [ 817.555007] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.606522] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.708729] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 [ 817.754602] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=23632 comm=syz-executor.2 15:35:40 executing program 1: syz_execute_func(&(0x7f0000000b40)="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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8000000008031, 0xffffffffffffffff, 0x0) 15:35:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x21, 0x0, &(0x7f00000000c0)) 15:35:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002480)=""/4096, 0x1000, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(0xffffffffffffffff, 0x7fff, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000380), 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0) 15:35:41 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:35:41 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 15:35:41 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff0d, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 15:35:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/fib_trie\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000002140)=""/4096, 0x1000}], 0x1, 0x0) [ 818.622015] kauditd_printk_skb: 271 callbacks suppressed [ 818.622024] audit: type=1400 audit(1556724941.549:17969): avc: denied { map } for pid=23681 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 818.778049] audit: type=1400 audit(1556724941.619:17970): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:41 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/28, 0x2c2) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0x40505330, &(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0xc0bc5310, &(0x7f0000000400)={0x0, 0x0, 0x0, {0x0, 0x989680}}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 818.948037] audit: type=1400 audit(1556724941.619:17971): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000180)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:35:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100), 0x0}, 0x20) 15:35:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x209) r1 = dup2(r0, r0) write(r0, &(0x7f0000002a40)="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", 0x771) write(r1, &(0x7f00000014c0)="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", 0x78b) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14}}}]}]}, 0x54}}, 0x0) [ 819.112410] audit: type=1400 audit(1556724941.649:17972): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x2, 0x4, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100)="ab", 0x0}, 0x20) [ 819.281165] audit: type=1400 audit(1556724941.669:17973): avc: denied { map } for pid=23681 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.437716] audit: type=1400 audit(1556724941.689:17974): avc: denied { map } for pid=23685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000d80)=[{{&(0x7f0000000340)=@ipx, 0x80, 0x0}}, {{&(0x7f0000000b40)=@xdp, 0x80, &(0x7f0000000c80), 0x0, &(0x7f0000000cc0)=""/164, 0xa4}}], 0x2, 0x0, 0x0) [ 819.554891] audit: type=1400 audit(1556724941.699:17975): avc: denied { map } for pid=23685 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f1234123f319bd070") ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 15:35:42 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 819.636793] audit: type=1400 audit(1556724941.709:17976): avc: denied { map } for pid=23686 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.745205] net_ratelimit: 24 callbacks suppressed [ 819.745210] protocol 88fb is buggy, dev hsr_slave_0 [ 819.755453] protocol 88fb is buggy, dev hsr_slave_1 15:35:42 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) chown(&(0x7f0000061280)='./file1\x00', 0x0, 0x0) [ 819.783336] audit: type=1400 audit(1556724941.709:17977): avc: denied { map } for pid=23685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 819.825183] protocol 88fb is buggy, dev hsr_slave_0 [ 819.830356] protocol 88fb is buggy, dev hsr_slave_1 [ 819.951460] audit: type=1400 audit(1556724941.709:17978): avc: denied { map } for pid=23685 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:35:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.225020] protocol 88fb is buggy, dev hsr_slave_0 [ 820.230219] protocol 88fb is buggy, dev hsr_slave_1 15:35:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x29, 0x200000000000005, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 15:35:43 executing program 4: socketpair$unix(0x1, 0x5, 0xc501000000000000, &(0x7f0000000000)) 15:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x111, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) 15:35:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x209) r1 = dup2(r0, r0) write(r0, &(0x7f0000002a40)="cc02201ac62f60fceb95138df18190fc04ccf43ba5a32028db369e5f1d39d245fbe430705a904cedfc25e7a4e0c89a70882a7d30ed42eef2b35ee33d903a760f54aff52a60066905e0f909d394d76d5f50a558c9450eaa8044c4b900940176780ab3313080d20687d2233931a96c7c7e67e441a0108e7ff90a1360c982a6e781701b091d6eb6162151ea751beb19624f1bef2bcab8e55531d69abb8f4e3bcc6cf223996ee00196c51724a7a9708b123922b04d7f167cd281d0a87d72a424484377120d51ff1dbc5bed33e40720c10d663bda9566ce87cbe22b5e2750aa2d7162a353a221351f6825d22550e95fa9db9088504b554d3973fd536eab64da335d12ad89b499594bc8db618a4b477a64496ba89240f2ccf21bb2727dd580ac5f8c3dfa7481f624716a8fad63ff4720eb602ae48ed7af3b02de78e86c095e68e8c9cd897bcf51577f52d4760872d034e24ef3cf47b4edd5e09fda2c40ca4ebbf612c0194af6dd4e8eeaae752b2b99e68fc1c8da8f7d809442a2d836b7463926c06ebf2b8ff03f60baa3d17fb7a46140716e6b563b83906ee4999e7a428fe91683f094a02e623d614f4e26cd34cd2c1decfd4b4e4ab8a58d8341207e7b84f10107127b8b1f0c2ef1ac6a4cc00aae46604c92b63a048f3d505b483942fc23a2911761b0440d91392eb83376cd4728e936a94f8fa4fdcb9c2c240a7d7a660a33c9fee03146b8598645ec584a9feb495e7d863f33e4c7903fcbeae045d57c617880898a5d175d0c477c39fcdcacc44c1ec3ca13c1d1688b8ac7c17ecfbc3c81d5eb55dc6f4420db6ba5fdabe8624f5466033cd0a8c578ce5e4b149ea3137b6e31c6a0301bf6f0617a1d35dc8a703fcebbcf4bf3178c0d869b816eb6c5e4148a49d2b9d5bcac0affd711e1309efe1d5b2601c030f6e9a8c0dd814fac562f62f5349bb680c21b4b66e397d7ea7a97831523c184e3403af8f7a74c0bd092ea8734622e946408fe7f7b3977930b1344b8ac2e5d7d867a5fccc01dbc70a6755f20d430ec48ce02d14322fdf4667c9924b8180ebcf4677da06fd8491f83ea0a1089d77624031641b33d6cac9ec2ea22a221107bbfdb3702e194376f02176d28f31c5ded82c5c9b746f1188f5d8745cd78b983813a8ef0c638acc4dbce471b283ad414f74b352cb715738ac0aa2fe651f50c26e07fc7e665c0907528a418faff570eb42e9a604e7e317a1227aa14efff2d5fc2e8960f0cd8ae36e32e6d38e74e0845c07a1b5b89ed8b0e04aa0decfd6429e35baa3432e3b94a83ba3bd9f059190a087cc40eca8eb972b9f9185dd423225fa2332a17eaaa500acf393cc436b216ba62d1d11ad444fc8b30d6453536ba45bd15201af1ef5c3f977c00107c1a6b41cb8af1d2eecc3cb10a4f0c20d86041262d048114a25bb4243e54d490e28e05f7dcb3a12e91ac8807ab02ad39996da9b73edeb5f462224e658c6be2f930dfe3689d27121183d256c321eec2291c6d642d32a263be3a157b04bcd52f69eba6c188ca9b5b14999b3e34d4c9e6f29301bde97062bd4ba09bc5d1b4e010b6e5b4ad61b80040efde5ff92d1d1916ba14fc639aeaa06c31b5d9943345c2badd128a59c47c8ed84372206d2436bb7d5f676a159412556483442e1d5a561798cb6b8bbbbaa0aab9470011a227da26ee603885d9bb695e6e7f00de7253324118452cfb78379eced4facb4705a0406b4a5672a0c12256881ea11d0debd10a11cc58b4ebfb9e59485ff2d3c7ab094a975412f1acb8695f27b0f2921ec32659ca2c8e7084b7718922391dcb231ecf70a5386b68cc089d7bf1d763b374edc300a2a9f94569ff943e7340e389c72a4de508a55a8c3bf328204955708e094cb68fe10c7f99c3e2c44e07d3500608174c48ded324d06840e540e2aa17080018dea4ac1305767e0cce7247d9e14eb7dd780e208dae79d0d74f82c87bffcb1661dbc1558919d2812556b6488eeff77f91da255e5217655757d27dff1012d162e7a5d1fa964ba783925069274cb0b970e632cde0d742fb52ddb0c6c78a380ee67663b8504e9378338431c91d8d09e04f5ca4cd4469c2591bfba59760b66a09d720b4d72499b78f5aeeca6816023afda6fb77e00ebbd944b2502482b5f39325b781f68c04d22e024ac5c372dbebbfbd20d835df52e2896394a71714bd4c50077673289fa9e1fca21be3c3ff4dc3f137f87178f4d7e8de2fffaebdaa5f8e32d3e606c2cae5182174f77dbeb2111c433ccaba56069c02e4dfdbe910c9d01b75abba2d56a11d6fb6b2d55f1c99e2113cc49108c4e051e6ac7220354aad283c3c039d1d6ae4f119be8d5d38747794d9fed122d982ca847ea68737af57f81a07c80472834db054c73ebe26e0226ed914a9ae1097bc6eb7ed2a4d656c02b32672ed4c7f419a13de97bdf7a8b495b006b769980813947dce0a6390dbcd6fd2364f42e37582a16788227b4db3e077336fa3298b77fb576f54830121a4ef011fcc9a47681a00518e78d92765ff6cf0cf3bfcf4a5c8df5b1c7b640bb3dc062e22e15beb9d30740a77f8980f85dbcb45e5e8b717980d16b494e9ff549c643d394b1eeee0ff22c97b89c02f9cca2b9e0805095262f97eef50591ef809ce2d61dde56304af62fff11321332b7269964d723202ede798c98a9dfbd988d782bb73da0e7046c5b1b1540967", 0x771) write(r1, &(0x7f00000014c0)="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", 0x78b) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @dev}}, {0x14}}}]}]}, 0x54}}, 0x0) [ 820.464857] protocol 88fb is buggy, dev hsr_slave_0 [ 820.470051] protocol 88fb is buggy, dev hsr_slave_1 [ 820.704726] protocol 88fb is buggy, dev hsr_slave_0 [ 820.709956] protocol 88fb is buggy, dev hsr_slave_1 15:35:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.849277] ------------[ cut here ]------------ [ 820.854441] WARNING: CPU: 1 PID: 7117 at kernel/bpf/core.c:537 bpf_jit_free+0x23a/0x310 [ 820.862596] Kernel panic - not syncing: panic_on_warn set ... [ 820.862596] [ 820.869974] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 820.876648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.886026] Workqueue: events bpf_prog_free_deferred [ 820.891138] Call Trace: [ 820.893738] dump_stack+0x138/0x19c [ 820.897382] panic+0x1f2/0x438 [ 820.900580] ? add_taint.cold+0x16/0x16 [ 820.904568] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 820.911691] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 820.916626] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 820.923775] Oops: 0000 [#1] PREEMPT SMP KASAN [ 820.928452] Modules linked in: [ 820.931698] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 820.938365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:35:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff84}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000001140)="afa55ea8a91d1dc7610da2290f9e", 0x0, 0x737}, 0x28) [ 820.949751] Workqueue: events bpf_prog_free_deferred [ 820.954864] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 820.960938] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 820.966387] RSP: 0018:ffff888063db7810 EFLAGS: 00010806 [ 820.971782] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 820.979068] RDX: 0000000000000000 RSI: ffffffff869d1e40 RDI: ffffc900018fd002 [ 820.986435] RBP: ffff888063db7850 R08: 0000000000000000 R09: ffff8880a574a9f0 [ 820.993708] R10: ffff8880a574a9d0 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.000982] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.008524] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.016758] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.022652] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.029929] Call Trace: [ 821.032526] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.039632] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.044557] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.051602] Oops: 0000 [#2] PREEMPT SMP KASAN [ 821.056087] Modules linked in: [ 821.059281] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.065946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.075398] Workqueue: events bpf_prog_free_deferred [ 821.080502] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.086561] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.092001] RSP: 0018:ffff888063db7368 EFLAGS: 00010806 [ 821.097357] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.104651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.111936] RBP: ffff888063db73a8 R08: 0000000000000000 R09: 0000000000000001 [ 821.119205] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.126469] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.133738] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.141968] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.147949] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.155392] Call Trace: [ 821.158015] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.165141] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.170158] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.177009] Oops: 0000 [#3] PREEMPT SMP KASAN [ 821.181519] Modules linked in: [ 821.184712] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.191391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.200764] Workqueue: events bpf_prog_free_deferred [ 821.205902] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.211968] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.217417] RSP: 0018:ffff888063db6eb8 EFLAGS: 00010806 [ 821.222783] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.230053] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.237322] RBP: ffff888063db6ef8 R08: 0000000000000000 R09: 0000000000000001 [ 821.244592] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.251867] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.259140] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.267371] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.273345] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.280616] Call Trace: [ 821.283216] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.290333] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.295263] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.302128] Oops: 0000 [#4] PREEMPT SMP KASAN [ 821.306622] Modules linked in: [ 821.309852] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.317917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.327370] Workqueue: events bpf_prog_free_deferred [ 821.333429] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.339501] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.344947] RSP: 0018:ffff888063db6a08 EFLAGS: 00010806 [ 821.350329] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.357776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.365050] RBP: ffff888063db6a48 R08: 0000000000000000 R09: 0000000000000001 [ 821.372318] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.379589] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.386860] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.395116] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.401004] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.408276] Call Trace: [ 821.410875] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.418161] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.423080] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.430021] Oops: 0000 [#5] PREEMPT SMP KASAN [ 821.434507] Modules linked in: [ 821.437702] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.444356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.453720] Workqueue: events bpf_prog_free_deferred [ 821.458818] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.464879] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.470320] RSP: 0018:ffff888063db6558 EFLAGS: 00010806 [ 821.475677] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.482952] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.490398] RBP: ffff888063db6598 R08: 0000000000000000 R09: 0000000000000001 [ 821.497665] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.504930] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.512210] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.520434] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.526312] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.533581] Call Trace: [ 821.536175] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.543285] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.548208] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.555147] Oops: 0000 [#6] PREEMPT SMP KASAN [ 821.559634] Modules linked in: [ 821.562819] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.569558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.578935] Workqueue: events bpf_prog_free_deferred [ 821.584037] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.590102] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.595551] RSP: 0018:ffff888063db60a8 EFLAGS: 00010806 [ 821.600921] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.608191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.615461] RBP: ffff888063db60e8 R08: 0000000000000000 R09: 0000000000000001 [ 821.622732] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.630004] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.637269] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.645497] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.651377] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.658644] Call Trace: [ 821.661240] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.668360] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.674679] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.681534] Oops: 0000 [#7] PREEMPT SMP KASAN [ 821.686025] Modules linked in: [ 821.689234] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.695890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.705255] Workqueue: events bpf_prog_free_deferred [ 821.710360] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.716421] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.721870] RSP: 0018:ffff888063db5bf8 EFLAGS: 00010806 [ 821.727237] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.734503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.741792] RBP: ffff888063db5c38 R08: 0000000000000000 R09: 0000000000000001 [ 821.749064] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.756335] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.763607] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.771832] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.777709] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.784981] Call Trace: [ 821.787576] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.794781] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.799705] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.806642] Oops: 0000 [#8] PREEMPT SMP KASAN [ 821.811127] Modules linked in: [ 821.814330] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.820985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.830350] Workqueue: events bpf_prog_free_deferred [ 821.837101] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.843165] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.848611] RSP: 0018:ffff888063db5748 EFLAGS: 00010806 [ 821.853999] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.861290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 821.868566] RBP: ffff888063db5788 R08: 0000000000000000 R09: 0000000000000001 [ 821.875852] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 821.889478] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 821.896771] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 821.904999] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 821.910904] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 821.918196] Call Trace: [ 821.920819] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 821.928194] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 821.933123] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 821.939991] Oops: 0000 [#9] PREEMPT SMP KASAN [ 821.944508] Modules linked in: [ 821.947699] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 821.954356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.963724] Workqueue: events bpf_prog_free_deferred [ 821.968827] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 821.974901] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 821.980344] RSP: 0018:ffff888063db5298 EFLAGS: 00010806 [ 821.985707] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 821.992977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.000423] RBP: ffff888063db52d8 R08: 0000000000000000 R09: 0000000000000001 [ 822.007702] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.014976] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.022270] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.030503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.036380] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.043665] Call Trace: [ 822.046281] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.053526] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.058627] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.066378] Oops: 0000 [#10] PREEMPT SMP KASAN [ 822.070951] Modules linked in: [ 822.074142] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.080799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.090428] Workqueue: events bpf_prog_free_deferred [ 822.095528] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.101594] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.107037] RSP: 0018:ffff888063db4de8 EFLAGS: 00010806 [ 822.112394] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.119664] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.126954] RBP: ffff888063db4e28 R08: 0000000000000000 R09: 0000000000000001 [ 822.134221] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.141493] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.148935] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.157181] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.163076] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.170342] Call Trace: [ 822.172939] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.180326] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.185249] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.192099] Oops: 0000 [#11] PREEMPT SMP KASAN [ 822.196671] Modules linked in: [ 822.199860] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.206515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.215879] Workqueue: events bpf_prog_free_deferred [ 822.220998] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.227156] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.232598] RSP: 0018:ffff888063db4938 EFLAGS: 00010806 [ 822.238004] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.245286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.252562] RBP: ffff888063db4978 R08: 0000000000000000 R09: 0000000000000001 [ 822.259921] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.267276] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.274548] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.282869] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.288763] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.296037] Call Trace: [ 822.298631] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.305737] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.310664] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.317599] Oops: 0000 [#12] PREEMPT SMP KASAN [ 822.322171] Modules linked in: [ 822.325373] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.332041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.341428] Workqueue: events bpf_prog_free_deferred [ 822.346538] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.352608] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.358059] RSP: 0018:ffff888063db4488 EFLAGS: 00010806 [ 822.363433] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.370727] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.378000] RBP: ffff888063db44c8 R08: 0000000000000000 R09: 0000000000000001 [ 822.385271] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.392547] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.399822] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.408049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.413933] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.421204] Call Trace: [ 822.423813] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.431366] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.436295] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.443169] Oops: 0000 [#13] PREEMPT SMP KASAN [ 822.447748] Modules linked in: [ 822.450949] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.457605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.467074] Workqueue: events bpf_prog_free_deferred [ 822.472199] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.478287] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.483737] RSP: 0018:ffff888063db3fd8 EFLAGS: 00010806 [ 822.489112] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.496399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.503692] RBP: ffff888063db4018 R08: 0000000000000000 R09: 0000000000000001 [ 822.510969] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.518239] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.525512] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.533931] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.539809] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.547077] Call Trace: [ 822.549679] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.556803] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.561722] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.568576] Oops: 0000 [#14] PREEMPT SMP KASAN [ 822.573148] Modules linked in: [ 822.576357] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.583033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.592420] Workqueue: events bpf_prog_free_deferred [ 822.597548] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.603606] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.609069] RSP: 0018:ffff888063db3b28 EFLAGS: 00010806 [ 822.614459] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.621736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.629179] RBP: ffff888063db3b68 R08: 0000000000000000 R09: 0000000000000001 [ 822.636537] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.643805] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.651266] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.659494] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.665400] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.672771] Call Trace: [ 822.675372] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.682488] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.687430] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.694285] Oops: 0000 [#15] PREEMPT SMP KASAN [ 822.698860] Modules linked in: [ 822.702150] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.708806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.718172] Workqueue: events bpf_prog_free_deferred [ 822.723306] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.729391] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.734833] RSP: 0018:ffff888063db3678 EFLAGS: 00010806 [ 822.740188] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.747453] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.754721] RBP: ffff888063db36b8 R08: 0000000000000000 R09: 0000000000000001 [ 822.761984] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.769252] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.776518] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.784733] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.790609] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.797875] Call Trace: [ 822.800472] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.807596] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.812515] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.819366] Oops: 0000 [#16] PREEMPT SMP KASAN [ 822.823936] Modules linked in: [ 822.827125] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.833804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.843169] Workqueue: events bpf_prog_free_deferred [ 822.848275] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.854339] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.859789] RSP: 0018:ffff888063db31c8 EFLAGS: 00010806 [ 822.865156] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 822.872425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 822.879691] RBP: ffff888063db3208 R08: 0000000000000000 R09: 0000000000000001 [ 822.886960] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 822.894227] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 822.901494] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 822.909719] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 822.915601] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 822.922877] Call Trace: [ 822.925490] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 822.932603] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 822.937615] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 822.947019] Oops: 0000 [#17] PREEMPT SMP KASAN [ 822.951603] Modules linked in: [ 822.954796] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 822.961455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.970824] Workqueue: events bpf_prog_free_deferred [ 822.976016] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 822.982099] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 822.987545] RSP: 0018:ffff888063db2d18 EFLAGS: 00010806 [ 822.992992] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.000260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.007552] RBP: ffff888063db2d58 R08: 0000000000000000 R09: 0000000000000001 [ 823.014842] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.022117] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.029396] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.037652] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.043533] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.050806] Call Trace: [ 823.053409] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.060537] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.065478] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.072329] Oops: 0000 [#18] PREEMPT SMP KASAN [ 823.076925] Modules linked in: [ 823.080119] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.086790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.096257] Workqueue: events bpf_prog_free_deferred [ 823.101360] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.107432] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.112876] RSP: 0018:ffff888063db2868 EFLAGS: 00010806 [ 823.118266] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.125553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.132824] RBP: ffff888063db28a8 R08: 0000000000000000 R09: 0000000000000001 [ 823.140096] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.147390] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.154663] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.162893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.168860] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.176136] Call Trace: [ 823.178741] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.185856] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.190796] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.197651] Oops: 0000 [#19] PREEMPT SMP KASAN [ 823.202222] Modules linked in: [ 823.205496] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.212416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.221791] Workqueue: events bpf_prog_free_deferred [ 823.226991] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.233320] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.238905] RSP: 0018:ffff888063db23b8 EFLAGS: 00010806 [ 823.244268] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.251717] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.259097] RBP: ffff888063db23f8 R08: 0000000000000000 R09: 0000000000000001 [ 823.266521] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.274125] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.281640] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.290014] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.295902] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.303178] Call Trace: [ 823.305780] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.312892] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.317812] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.324664] Oops: 0000 [#20] PREEMPT SMP KASAN [ 823.329487] Modules linked in: [ 823.332796] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.339625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.349103] Workqueue: events bpf_prog_free_deferred [ 823.354206] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.360497] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.366199] RSP: 0018:ffff888063db1f08 EFLAGS: 00010806 [ 823.371561] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.378855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.386128] RBP: ffff888063db1f48 R08: 0000000000000000 R09: 0000000000000001 [ 823.393416] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.400708] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.407993] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.416219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.422095] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.429394] Call Trace: [ 823.431995] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.439198] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.444150] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.451026] Oops: 0000 [#21] PREEMPT SMP KASAN [ 823.455604] Modules linked in: [ 823.458794] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.465451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.475145] Workqueue: events bpf_prog_free_deferred [ 823.480350] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.486414] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.491880] RSP: 0018:ffff888063db1a58 EFLAGS: 00010806 [ 823.497247] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.504536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.511803] RBP: ffff888063db1a98 R08: 0000000000000000 R09: 0000000000000001 [ 823.519093] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.526378] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.533647] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.541873] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.547745] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.555021] Call Trace: [ 823.557639] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.564752] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.569679] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.576536] Oops: 0000 [#22] PREEMPT SMP KASAN [ 823.581110] Modules linked in: [ 823.584300] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.590973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.600341] Workqueue: events bpf_prog_free_deferred [ 823.605445] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.611526] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.616972] RSP: 0018:ffff888063db15a8 EFLAGS: 00010806 [ 823.622359] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.629649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.636919] RBP: ffff888063db15e8 R08: 0000000000000000 R09: 0000000000000001 [ 823.644190] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.651460] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.658740] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.666973] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.672938] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.680212] Call Trace: [ 823.682822] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.689938] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.694862] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.701719] Oops: 0000 [#23] PREEMPT SMP KASAN [ 823.706307] Modules linked in: [ 823.709597] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.716339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.725722] Workqueue: events bpf_prog_free_deferred [ 823.730914] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.736974] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.742417] RSP: 0018:ffff888063db10f8 EFLAGS: 00010806 [ 823.747782] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.755049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.762316] RBP: ffff888063db1138 R08: 0000000000000000 R09: 0000000000000001 [ 823.769592] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.776861] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.784130] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.792378] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.798272] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.805549] Call Trace: [ 823.808145] BUG: unable to handle kernel paging request at fffffbfff4002000 [ 823.815258] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 823.820178] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 79c23067 PTE 0 [ 823.827065] Oops: 0000 [#24] PREEMPT SMP KASAN [ 823.831640] Modules linked in: [ 823.835919] CPU: 1 PID: 7117 Comm: kworker/1:4 Not tainted 4.14.114 #4 [ 823.842686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.852056] Workqueue: events bpf_prog_free_deferred [ 823.857161] task: ffff8880a574a100 task.stack: ffff888063db0000 [ 823.863232] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 823.868676] RSP: 0018:ffff888063db0c48 EFLAGS: 00010806 [ 823.874033] RAX: 1ffffffff4002000 RBX: ffffffffa0010000 RCX: 0000000000000002 [ 823.881308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018fd002 [ 823.888575] RBP: ffff888063db0c88 R08: 0000000000000000 R09: 0000000000000001 [ 823.895844] R10: 0000000000000000 R11: ffff8880a574a100 R12: ffff88809fae4918 [ 823.903112] R13: dffffc0000000000 R14: ffff88809fae4918 R15: ffffffffffffffff [ 823.910383] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 823.918611] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.924492] CR2: fffffbfff4002000 CR3: 0000000098eeb000 CR4: 00000000001406e0 [ 823.931764] Call Trace: [ 823.934373] BUG: unable to handle kernel paging request at fffffbfff4002000