[ 44.359915] audit: type=1800 audit(1569889730.787:30): pid=7854 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 48.385755] kauditd_printk_skb: 4 callbacks suppressed [ 48.385771] audit: type=1400 audit(1569889734.857:35): avc: denied { map } for pid=8030 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.154' (ECDSA) to the list of known hosts. 2019/10/01 00:29:01 fuzzer started [ 55.151235] audit: type=1400 audit(1569889741.617:36): avc: denied { map } for pid=8039 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/01 00:29:03 dialing manager at 10.128.0.105:38839 2019/10/01 00:29:03 syscalls: 2489 2019/10/01 00:29:03 code coverage: enabled 2019/10/01 00:29:03 comparison tracing: enabled 2019/10/01 00:29:03 extra coverage: extra coverage is not supported by the kernel 2019/10/01 00:29:03 setuid sandbox: enabled 2019/10/01 00:29:03 namespace sandbox: enabled 2019/10/01 00:29:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/01 00:29:03 fault injection: enabled 2019/10/01 00:29:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/01 00:29:03 net packet injection: enabled 2019/10/01 00:29:03 net device setup: enabled 00:31:43 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) listen(r0, 0x1ff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000000)={0x418}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000080)=0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@initdev}}, &(0x7f00000005c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000680)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) r12 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000001b40)='/selinux/avc/cache_stats\x00'}, 0x30) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = socket$inet_sctp(0x2, 0x1, 0x84) r17 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d80)={&(0x7f0000001d40)='/selinux/avc/cache_stats\x00'}, 0x10) r19 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r20 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/vga_arbiter\x00', 0x22141, 0x0) r21 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/ubi_ctrl\x00', 0x30082, 0x0) r22 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r23 = signalfd4(r1, &(0x7f0000001e40)={0x2}, 0x8, 0x140c00) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ec0)={0x0, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000001e80)='/selinux/avc/cache_stats\x00'}, 0x30) stat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getgid() fcntl$getownex(r1, 0x10, &(0x7f0000001fc0)={0x0, 0x0}) getresuid(&(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)=0x0) r29 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300)={0x0}, &(0x7f0000003340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003380)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000003480)=0xe8) lstat(&(0x7f00000034c0)='./file0\x00', &(0x7f0000003500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r33 = fcntl$getown(0xffffffffffffffff, 0x9) r34 = getuid() stat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004f40)=0x0) lstat(&(0x7f0000004f80)='./file0\x00', &(0x7f0000004fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000005040)=[0x0, 0xffffffffffffffff, 0x0, 0xee01, 0xee00]) r39 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000005080)='/dev/loop-control\x00', 0xc0501, 0x0) r40 = mq_open(&(0x7f00000050c0)='\x00', 0x0, 0x0, &(0x7f0000005100)={0xfffffffffffffe22, 0x74c1dfd1, 0x1, 0x5, 0x6, 0x5, 0x2, 0x401}) r41 = socket$tipc(0x1e, 0xa, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000005140)={0x3, 0xffffffffffffffff}) r43 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000005180)='/dev/snapshot\x00', 0x20480, 0x0) r44 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000051c0)='net/softnet_stat\x00') r45 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005200)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@initdev}}, &(0x7f0000005300)=0xe8) getresgid(&(0x7f0000005340), &(0x7f0000005380)=0x0, &(0x7f00000053c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005440)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000005400)='+eth1\x00'}, 0x30) r49 = getgid() r50 = socket$nl_netfilter(0x10, 0x3, 0xc) r51 = accept(r2, &(0x7f0000005480)=@hci, &(0x7f0000005500)=0x80) r52 = openat$zero(0xffffffffffffff9c, &(0x7f0000005540)='/dev/zero\x00', 0x14101, 0x0) sendmmsg$unix(r3, &(0x7f0000006d00)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000180)="0d1d8d8489b14c5afe0d315e5aa17843263240f74ebc0e7a85ef93c4d8be1d0ed62cbe5cb5716535469f05508f5272c23a2469a36a232d824931a781ec402535f9f31a575ad7978a63853e5b784313f06080a75180370591c9a8af495a48a109a76bda8099fc2539a8ba91afb89b849813750f1b304890e997b4daa4aeca8fede85bd0d609fcbf6158613b23e595f65a93624436f4df2a9a573c74dc8e2a5cd33943f6cb706cbca189a41f5855acdef61453f412b6eb36b0919cfd7498d0c6631887872a7b86e88b927a8b8e0d021e0e388c4540ac393cd9901fdd02fe70d144a27b1a5185149962348996f867e47b11", 0xf0}], 0x1, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}], 0x60}, {&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001ac0)=[{&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="d68390f5e0974a732388f02ce707f37340058105353e16feb363b39c9f1f8b226f5916114ef0058865e16fd6eaa7a8e835fb336479d4b94664c54fc4", 0x3c}, {&(0x7f0000001880)="ce3e36a07002f0f693ca02c4df162dbe2c0abd34e8f333e32b6dbeac96a59fdb96a8d3f7b0539966548bcae42e9cd7f2440e2f75", 0x34}, {&(0x7f00000018c0)="7985f8e3d3e02ae566088dcb1b9a45e20b64a4eb2653ca651abffec44dc009f22af06ae8de1d8e83582690202ab489098599e0afbb8bf38b76d6ee2a2922f7108478cfedb350f9c71014fcbd03590b97d094ab7ad70a6a38a5aa4caf0d64692ef2749c9b21cb", 0x66}, {&(0x7f0000001940)="8c9becfe256003e7bae4559972e0479b7b34ab24f4773da96f1a357cf32b064a523215b97f2d7f06b6e7dad897694ce2c322591d561b8fb842d1dff83dae4e5f3ad78c3be005c45a94277e031510023cdd688e96d8a744e9e675af7ef78ce5150d577d31290d6aa886d1b5eec38c1dc2742af593ca0adec673c2e18b32d4321de7fe7aa995", 0x85}, {&(0x7f0000001a00)="a72f552be6a31814b9ab9aae9ca57f3157ac7a103af9f33133bc29db863f9e879f0f9e44f6c389f57141a791e196a00ba73791ce6aeaa5b5917c2ddcee262ca039cfa3e9640ca54270b90214c652a84e7e973129df65529a6c058b001eab648642be1b7be3151d6e5048d3fcb1eb804faf03d4ccee3bafbc83693e5cf11522e94117df9c15f061617b6bc0e816", 0x8d}], 0x6, &(0x7f00000020c0)=[@cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x1c, 0x1, 0x1, [r0, r16, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r17, r18, r19, r20, r1, r21, r1, r22, 0xffffffffffffffff, r23]}}, @cred={{0x1c, 0x1, 0x2, {r24, r25, r26}}}, @cred={{0x1c, 0x1, 0x2, {r27, r28, r29}}}], 0xb8, 0x800}, {&(0x7f0000002180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000032c0)=[{&(0x7f0000002200)="a97796fc705e213eb1f31d5b16016bd754ab8e0ab1eca3961b793b3eb85682fa62a54efa8ab89a922d14a08d28b25016759a0cab6fdba40d82068a07a1f780dfc4e7473026ff29397df2161006031b9724c9f4efbcc19a027deb286086a32dd23cbf0ef702cd420ca312aa9a534176927d46b613dde0f7b032e461199bbf037fb6a25322ef9c2b6d82293bac237298fff6b7362f4417b590d13af8453ee7afb288632461dca717a2e785", 0xaa}, {&(0x7f00000022c0)="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", 0x1000}], 0x2, &(0x7f0000003580)=[@cred={{0x1c, 0x1, 0x2, {r30, r31, r32}}}, @rights={{0x1c, 0x1, 0x1, [r2, r0, r1]}}], 0x40}, {&(0x7f00000035c0)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000003780)=[{&(0x7f0000003640)}, {&(0x7f0000003680)="9c2d0f39a748364ec74809706ef53c34174fb0d56d3759083c03df0bf70b96891f22553d9860a3fa13426b96e56ebc6b6f6f9f3a837ffd5ace46ef9c184da3e2ec5c3fffa92874125aa6db81a15ecceb0afed5261ca6cbdd30f643aaf6da40a2211a48b6ba5645c164c8bc356d80d2c464222989a3c511aaac4d958cc82b2f201c913f07caa432c115847988c067436c1eb2b64955d45dbbf98601f6471df7e0f1d408ac88d2f3487c87519c793a2e2c6121b3ef0f2f8d2358a778462569266b823557454a3cbe638ef546b084de3a613f2b27a500f661bb725bb401666fea33a7e2e9768ccc6b9628e2b1070ad318b9032d0248", 0xf4}], 0x2, &(0x7f0000003880)=[@cred={{0x1c, 0x1, 0x2, {r33, r34, r35}}}], 0x20, 0x4}, {&(0x7f00000038c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003d00)=[{&(0x7f0000003940)="e553719bab5794bef17d849d4cbdf65fbed10e4b2d017086a99ccc45a39a41c32eafa35472f86f563909a80e996a86d4f26724796b662cacf1e41aa09186203ceab1895a9a99356006601fb519656c33ea2d8c0cab1d0c795dd3e130aca101b9432148b8e5d9025c8a25ef83d12a4c839f75c5bb2028782a2a90a255bfb8bd8fb1a65f82cacdd42f994e21d3e685b04a717768062de6b3b910ac82d9b29ddafcbb19756f97338c1fac611d4d6184454eca809f09454098d98f3b40f342594ed065adc928bd19a0de8f55c935e731bc850ae49a18964b152f", 0xd8}, {&(0x7f0000003a40)="b2a2a3ebe15e1923d08614a65a518500041eb0486fb752907dfb2bbab55f6a56594b3451c1815917307b3269a3369f9b24c58cfaab4055b39338", 0x3a}, {&(0x7f0000003a80)="67c7ea739bdafa139bd87a7f99adfd5134ad42e47f28ae0bb8cadcb38e1941a5a40151b17e085fc30809b6d54ed89d86b52de7faac8891b6c609d4df9832f9d85a19a28a4cfed3299e5a9d2b462f9d09d42b1ad0ccc5efa49b2f7e88b88f01766fe4cccb047288186fa9739ae23ccf44075b87e5ffb593fe32d3c0a83885231af1fe16de095305830ed59a918fd0acc564bdf917667ac9091dd7abb57762d8bfe1c2e696d621eb89bae93256529a14f59589c142ea897646b15682d1d446eb93270cdc1ad1616beab26c05", 0xcb}, {&(0x7f0000003b80)="7aa253f43bb3f9c70c114de14e7a15d15064bedf7b46b5a38e82d0f67eb823fb221b71d2c50a5bb1a33bf4293b01a708fed53a5e814c2bd05f12654382b5dcc0d7b4d233b8ff7461258b38bc32da8b40dc1d467ce829dafdd5bde66457521f1c5cd0d3c34057348feaafb68c8fec08665838f8677e35ec7661760937a57f362cf1eb56deb6ef48425e91fbada6ca2db7b646a5a171bd6b0d881d543f84f08127e63b8017f2", 0xa5}, {&(0x7f0000003c40)="467a809322df000fe9c12822fc186b20f27db0bc2e5a426de52a7a11b32f437686f0b09ae246af9b4a099946eda6b867330c2b6690918e7abe63e4d046b7c122a58aff80a5527fcbc53e8637de81faa71927ec10d94c9ea97585e148e0c3a082acdc621a723334bc5f8a4ed5ceed50d4c4c72bc251e6aea2f0fdc6db2ddccafaf2590270ffc3f8bbd5b1", 0x8a}], 0x5, 0x0, 0x0, 0x20000000}, {&(0x7f0000003d80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004f00)=[{&(0x7f0000003e00)="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", 0x1000}, {&(0x7f0000004e00)="069eb09ce6767ac5e967dd669d94298c930d0abb0ac628e68c84d6b7c7242f25cffa243205a72ef04baeadd4301d281a92f203323fe8e491dcc6e25d45618bb9b9986acc74ae20235c508ca2cf21f155ea80b614d15fdad4f6e1ab7740e7398189846fa35e2f3488909ed1cb413584baf901cc8f655e751167b7edb3cab1feb8ee7af9cc457e7c6964f2af7f55ec6318c117c8ea27d5a7fb43ce41f508e5a89e91bac18beed8a626ce57381b6d976ddde5f9b45328420807ec568c2c07efa27cf5d8a206e5157ab7814336c8efe6f5b3c6bdc5d19f5ed5b3250ca767102d282561", 0xe1}], 0x2, &(0x7f0000005580)=[@cred={{0x1c, 0x1, 0x2, {r36, r37, r38}}}, @rights={{0x2c, 0x1, 0x1, [r0, r39, r40, r41, r42, 0xffffffffffffffff, r43]}}, @rights={{0x18, 0x1, 0x1, [r1, r44]}}, @cred={{0x1c, 0x1, 0x2, {r45, r46, r47}}}, @cred={{0x1c, 0x1, 0x2, {r48, 0xee00, r49}}}, @rights={{0x1c, 0x1, 0x1, [r50, r51, r1]}}, @rights={{0x14, 0x1, 0x1, [r52]}}], 0xe0, 0x2004b150}, {&(0x7f0000005680)=@file={0x3, './file0\x00'}, 0x6e, &(0x7f0000006c80)=[{&(0x7f0000005700)="7118909e2fa21db078eb0604c7d956fae07fca094501f968743bd6e3ec31284aa62a89e28f8d0fbb9ff567f46b6b1eb773a3899b8d281514b1e4d82da5c41b8c65fd7b3e109bcb09890cb4d014f7bc4089ce00672ef827863a76371efb87a75c", 0x60}, {&(0x7f0000005780)="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", 0x1000}, {&(0x7f0000006780)="6854e571e665ba091e295e84f231029ded8ef9bef2a219263a6841969b5f485c354ddc88626e90f88f09218a39ad3825c7d7bab64a948820af9727e7c70dff0ff724370eb7d89d7f95bf2c0f2698a45b3fc9badb235e30c3f540b184b43a5f7f2939296fdf5a8e8651741d48ece6af46d2f4e3ba6a7f0b739ffabc1386a711f97b9a8af4453fd7c0c8623634dc4dd5ed2be5222ae2d9acac6659c661a5752fe51fef89803b0c1249edae19f334633c602e4c86bcdb4c108663de7dfb5adddb4385e42cdc3315c70e5e931c65f3422efb00cbbd0f52d48a7589144c7ec7", 0xdd}, {&(0x7f0000006880)="6c40c07492d40aa230a95626d0e0cd9dbbd8524a8fc53b4e8ad4094d42d9f94401d8b4613ae55be6fe60e1b1480f228945a4a083328cc02c57f8c24c1a77e77b39a7aef682bbed93f200cc136b71fd44836a0739a9a3263e14c2f7bd73350e161c740adffe13fa08cc258b69ecfa40fda7f4f788426cc50b608df806ac449cf112c4b2447e94bfc957f7f15d1b2194ff6ffa563223036ae4c50ded5fc262712fe134fb5957d9aa2b74a98fa7c29b3594315595c5bdd9ddfd0356f16cf68a90826e3479aa", 0xc4}, {&(0x7f0000006980)="74a02b48f7af8de67d6473a2345219d76b137d8125181d683499ee3b4ab632fd373596ad9e2d3ea6c9b09e632afdcfeb6aba9b71f09c594433271e9dda0468edf2a1d6bd205fa7ce178634a17cc8f8dbef03847c484bb76800e0ea0a4bb4c867482c17014d03041418ca871f41a9a1d89ca8a2155ce43c5b0d43b6a37d61fe7bbc0e38b9652ab1bca3453287c0ccbc9444d4943d2d1b1193d4e9b71b6bc24ee4afc36e8ac9886a014c8a9fb62f6c7c12cc154df296881fd7a8518c65ddeefd75e334bf11ea38aee189800c83a5e797bbfa3298", 0xd3}, {&(0x7f0000006a80)="647ec94c4c83b9a1b3fbfaeee697260cfb8738069ceb46eedff959c29c9157b4c2ab2db869644d9e5a5873bc306618049be6d04c290f9c095854c8b452b0fd320f0d0fb78de2828ee09f28e031c56e0cc8643a297da9a5cac1a59d31f2a934453f3822633b93a86ad58fb3cdf1cf4d3e724770194a497fb4b014544c683863968e8ded0610b5dc89da41c89d1c77b0ac8818974c66a7e697c44eca26aa135b2adf489afdf664535671b03730c407089f12385bd800c6f651eb7305d1", 0xbc}, {&(0x7f0000006b40)="42187629e306a71a95d75fc4ed2aba0d0ee8ae4fad3b01ab30fe9c6e84cdbbcca381af03243e01f115c763102cf6ff3aa6aaa81d4cf20f9869af2acddcf70c2b6220291b302e020561d42badfbffacf9febaa9013453862d5cc7f10fbde5a40b5b1b12a4ad117bea59e9e7c67e4e067e51f4bf5221aff2a7b96366b900b53712", 0x80}, {&(0x7f0000006bc0)="f994ff6d8d31c922abbfa6afcc1ec60e7c0a0dc00685f8c46435cd9088d17ef7456f25d7007f74ed1a46c1996ccf7bd36977f901518247d2930abe5dc6d8cef4b5a493f470108725b5809460e7f07d0cf161a94407f6604655451f428fce14bcb28588b15d1995fc8461d448419ad1a8f8386021612242dc6ad2a1b4a362e446607a76dbca5e3fde15dc8f7c", 0x8c}], 0x8, 0x0, 0x0, 0x8000}], 0x7, 0x4040041) [ 217.073623] audit: type=1400 audit(1569889903.537:37): avc: denied { map } for pid=8057 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 217.175051] IPVS: ftp: loaded support on port[0] = 21 00:31:43 executing program 1: pipe2(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x104000) sendto$llc(r0, &(0x7f0000000940)="5236425cd509ce48b6623e58e14a86405a2833f636b06a87", 0x18, 0x20000050, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000980)='user\x00', &(0x7f00000009c0)={'syz', 0x2}, &(0x7f0000000a00)="123c9a5a423092972e0e96c2a92766224150db996063635e26da0d5aee69ed6005f0e09bb929eb7b0f4acef92d78baf789d31cfd166a2dd836162ce01939c576fa7c13bf22474b0046d803bb4d36f9e07dcfa6898f14aeadfb274b3a07ba0b84377acd46c1363dfc1ad790c878aca8c24ef77c27e252adbe3c38c20a2a55234c783fabaa531b23558ceefffc3998848f9591dcbc7098304b759b4d9eb8e2bc1c6a9297da4531cb213014f5f3fa3c597036a7156499ed6160a98fffa881398471ccb600247bfff57a5294b9a19d248b85ace4692d30f20e68cbc986a315f7527613d5dc251d345ddf2d9c1d358f2e61154ac7bc8015", 0xf5, 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f0000000b00)="3407b6a99917bbd6dbc220914eb3c1688f76f67b29bb91c1c3b003ffc911b8cdff3bfc5e26f123d09cf64d1dca3d308106ed2394874561d655a8946477f05feed4607926794caa6ebae8e46ce3de3c3efdefaaf8b83630dd8a8d09cd29982ebacc525e3da2a9430e6f7075c7f8b18c3296ad016125056915be8065c462dcf5072af8b4018392215ee551adb791ec5d0888f0d389be12c7b309644f6da86a41d62d7b52d9c4350bf56c251ea7a5f7727aa0508e3c648acc130a46fc563a2b", 0xbe) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000bc0)='/selinux/enforce\x00', 0x40002, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000c00)={0x2c, 0x4, 0x0, {0x4, 0x800, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x605, r0) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000c40)=""/91, &(0x7f0000000cc0)=0x5b) r4 = creat(&(0x7f0000000d00)='./file0\x00', 0x10) setsockopt$RDS_GET_MR(r4, 0x114, 0x2, &(0x7f0000000e00)={{&(0x7f0000000d40)=""/78, 0x4e}, &(0x7f0000000dc0), 0x2}, 0x20) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/vcs\x00', 0x4000, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000e80)={0x2a, 0x4, 0x0, {0x0, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000ec0)='/selinux/checkreqprot\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000f00)={0x0, @in={{0x2, 0x4e21, @remote}}, 0xc0000000, 0x10000, 0x3, 0x7, 0x1}, &(0x7f0000000fc0)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000001000)={r7, @in={{0x2, 0x4e20, @local}}, 0x6, 0x8}, &(0x7f00000010c0)=0x90) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000001100)) pipe(&(0x7f0000001140)={0xffffffffffffffff}) setsockopt$inet_udp_encap(r8, 0x11, 0x64, &(0x7f0000001180)=0x6, 0x4) socketpair(0x9, 0x5, 0xf8, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC(r9, 0x29, 0xcd, &(0x7f0000001200)={{0xa, 0x4e21, 0x10000, @ipv4={[], [], @local}, 0xfffeffff}, {0xa, 0x4e20, 0xffffffff, @mcast2}, 0x7, [0x62, 0x8, 0x2b, 0x800, 0xffffffff, 0xe89a, 0x5, 0x82a]}, 0x5c) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000001280)={0x0, 0x9}) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f00000012c0)={0x4b57}) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f0000001300)) r10 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_TIMESTAMP(r10, 0x1, 0x23, &(0x7f0000001340), &(0x7f0000001380)=0x4) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000013c0)='/selinux/checkreqprot\x00', 0x200000, 0x0) accept(r11, &(0x7f0000001400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000001480)=0x80) prctl$PR_GET_SECUREBITS(0x1b) syz_open_dev$vbi(&(0x7f00000014c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SMI(r6, 0xaeb7) [ 217.290549] chnl_net:caif_netlink_parms(): no params data found [ 217.370606] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.377881] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.386879] device bridge_slave_0 entered promiscuous mode [ 217.396896] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.403506] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.411270] device bridge_slave_1 entered promiscuous mode [ 217.437546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.447178] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 217.470434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 217.478881] team0: Port device team_slave_0 added [ 217.484735] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.500676] team0: Port device team_slave_1 added [ 217.513769] IPVS: ftp: loaded support on port[0] = 21 [ 217.520906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 217.528669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 00:31:44 executing program 2: getrusage(0x1, &(0x7f0000000000)) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x15076a54, 0x8413de5c02a32a3c) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x4, 0x63141837, 0x2, @stepwise={0x1, 0x1, 0x3, 0x10000, 0x0, 0x9}}) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v2={0x3, 0x2, 0x7, 0x1, 0x29, "852540a2d3468f8c16cc7728451dbcd6279052b3074fc0968c98e14a12be6abad472f5de736915c8f5"}, 0x33, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) lseek(r1, 0x0, 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x88000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x118, r3, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x24}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4084}, 0x40040) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x400, 0x0) pwrite64(r4, &(0x7f00000004c0)="53b35d591a2b188870a20b4740b4f3ee66ee6fcd50e2060d03af7d781ea4f81e69c257fab7bcfd6d8e2164e6db9de9cc4a7b210da666acea013c", 0x3a, 0x0) r5 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000540)={0x0, 0x9}, &(0x7f0000000580)=0x8) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000005c0)) r6 = syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x4, 0x22000) bind$inet6(r6, &(0x7f0000000640)={0xa, 0x4e22, 0xfffffffb, @mcast1, 0x8}, 0x1c) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000680)={[0x6, 0xf6, 0x6, 0x7, 0x1, 0x2, 0xfffffffffffffff8, 0x7fff, 0x4, 0x4, 0x401, 0x100000001, 0xaf7, 0x4, 0x10001, 0xfffffffffffffffc], 0x3000, 0x1}) r7 = syz_open_dev$vcsa(&(0x7f0000000740)='/dev/vcsa#\x00', 0x80000001, 0x80200) getsockopt$inet_udp_int(r7, 0x11, 0x1, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000840)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x28, r8, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x2, 0x8, 0x0, 0xfff]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r9 = open(&(0x7f0000000940)='./file0\x00', 0xd8082, 0x81) ioctl$sock_kcm_SIOCKCMATTACH(r9, 0x89e0, &(0x7f0000000980)={r1, r0}) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/dlm_plock\x00', 0xe6242a3c1f236709, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @remote, @multicast1}, &(0x7f0000000b00)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r10, 0x8936, &(0x7f0000000b40)={@mcast1, 0x61, r11}) getsockopt$rose(r7, 0x104, 0x5, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) fchmodat(0xffffffffffffff9c, &(0x7f0000000c00)='./file1\x00', 0x20) r12 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40082404, &(0x7f0000000c80)=0x1) [ 217.641634] device hsr_slave_0 entered promiscuous mode [ 217.695637] device hsr_slave_1 entered promiscuous mode [ 217.736374] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 217.743419] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 217.760626] IPVS: ftp: loaded support on port[0] = 21 00:31:44 executing program 3: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x81, 0x80) fsync(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='io\x00') ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000080)={0x0, 0x3}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0xb, &(0x7f00000000c0)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map={0x18, 0x9, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0xc, 0x1c92cbb991dd198d, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x0, 0xc, 0x6, 0x8, 0x40, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, @generic={0x81, 0x8, 0x7, 0x6, 0xcb9}, @ldst={0x1, 0x3, 0x0, 0x2, 0x6, 0x10, 0x10}], &(0x7f0000000140)='GPL\x00', 0x7, 0x44, &(0x7f0000000180)=""/68, 0xa2b00, 0x4, [], r2, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x7, 0xfff, 0xfffffffa}, 0x10}, 0x70) r3 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x2, 0x2000) ioctl$KDENABIO(r3, 0x4b36) r4 = dup2(r3, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f00000003c0)={r5, 0x1}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000001440)={r6, &(0x7f0000000440)=""/4096}) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20\x00', 0xe0a40, 0x0) ioctl$KVM_SET_TSC_KHZ(r7, 0xaea2, 0x0) r8 = dup(r1) ioctl$TIOCMSET(r8, 0x5418, &(0x7f00000014c0)=0x101) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001500)='/dev/snapshot\x00', 0x101000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r9, 0x111, 0x5, 0x9, 0x4) r10 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_REGS(r10, 0x4090ae82, &(0x7f0000001580)={[0x7, 0x10001, 0x0, 0x7, 0x73, 0x6, 0x1f, 0x80000001, 0x3, 0x7, 0xe0c, 0x80000001, 0x1ff, 0x0, 0x48, 0x1], 0xf000, 0x112002}) r11 = syz_init_net_socket$ax25(0x3, 0x3, 0x1be) ioctl$sock_TIOCOUTQ(r11, 0x5411, &(0x7f0000001640)) openat$random(0xffffffffffffff9c, &(0x7f0000001680)='/dev/urandom\x00', 0x2000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r9, 0x110, 0x3) r12 = syz_open_dev$video4linux(&(0x7f00000016c0)='/dev/v4l-subdev#\x00', 0x8, 0x49a004) ioctl$VIDIOC_STREAMOFF(r12, 0x40045613, &(0x7f0000001700)) clock_gettime(0x0, &(0x7f0000001840)={0x0, 0x0}) mq_timedreceive(r8, &(0x7f0000001740)=""/251, 0xfb, 0x57a, &(0x7f0000001880)={r13, r14+30000000}) prctl$PR_GET_SECCOMP(0x15) [ 217.840702] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.847336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.854490] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.861144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.877226] chnl_net:caif_netlink_parms(): no params data found [ 218.027003] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.033517] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.046169] device bridge_slave_0 entered promiscuous mode [ 218.084372] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.094474] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.104285] device bridge_slave_1 entered promiscuous mode [ 218.124082] IPVS: ftp: loaded support on port[0] = 21 [ 218.163258] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 218.172545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.210049] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.223532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.239359] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:31:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x3800, 0x8, [], &(0x7f0000000040)=0xf6}) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000100)=""/187) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x4840, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) r4 = getgid() r5 = geteuid() getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) getresgid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f00000006c0)={0x340, 0x0, 0x3, [{{0x5, 0x2, 0x7fff, 0x6, 0x800, 0x7ff, {0x6, 0x0, 0x6, 0x20, 0x7fff, 0x8, 0x80, 0x0, 0x5, 0x0, 0x8a, r3, r4, 0xfffffff8, 0x4}}, {0x2, 0xa630, 0x4, 0x8, 'em1('}}, {{0x3, 0x2, 0x2, 0x80000001, 0xff, 0x2, {0x1, 0x3ff, 0x0, 0x7, 0x9, 0x1f, 0x7f, 0x4, 0x800, 0x3ff, 0x7, r5, 0x0, 0xfffffa36, 0x1}}, {0x5, 0x0, 0x1, 0x20, '^'}}, {{0x0, 0x0, 0x6, 0xffff, 0xfff, 0x3, {0x2, 0xfffffffffffff800, 0x4, 0x4, 0x10001, 0x0, 0x1, 0x2, 0x800, 0x7, 0x6d, r6, r7, 0x8000, 0x4a313617}}, {0x3, 0x1, 0x6, 0xc4, 'cpuset'}}, {{0x4, 0x0, 0xb51, 0x80000000, 0x101, 0x0, {0x2, 0xfb, 0xc56d, 0x0, 0x5, 0x80000001, 0x5, 0x5, 0x1, 0x2, 0x3f, r8, r9, 0x1, 0xfffff001}}, {0x0, 0x3, 0xa, 0x38b, '/dev/vbi#\x00'}}, {{0x5, 0x1, 0x9, 0x3, 0x4, 0x3, {0x5, 0x9, 0x20, 0x7f, 0xffffffffffffff81, 0x5, 0x8, 0x0, 0x8, 0x4, 0x85, 0xffffffffffffffff, r10, 0x8, 0x81}}, {0x0, 0x6, 0xa, 0x7, '/dev/vbi#\x00'}}]}, 0x340) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000a00)) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a80)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r11, &(0x7f0000000d00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000ac0)={0x1d0, r12, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x175}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80000001, @remote, 0x3f}}, {0x20, 0x2, @in6={0xa, 0x7f, 0x2, @local, 0x9}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x10, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'bpq0\x00'}}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb86}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) openat$cgroup_ro(r2, &(0x7f0000000d40)='pids.current\x00', 0x0, 0x0) r13 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d80)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(r13, 0x541e, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=""/49}) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000e80)) r14 = syz_open_dev$midi(&(0x7f0000000ec0)='/dev/midi#\x00', 0x8, 0x510441) ioctl$VT_GETMODE(r14, 0x5601, &(0x7f0000000f00)) r15 = perf_event_open$cgroup(&(0x7f0000000f40)={0x4, 0x70, 0x20, 0x0, 0x1, 0x2, 0x0, 0xede4, 0x44000, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf5, 0x1, @perf_config_ext={0x3ff, 0x1ff}, 0x10, 0x5, 0x7, 0x3, 0xffffffff, 0x9, 0x4}, r1, 0xc, 0xffffffffffffffff, 0x1) fadvise64(r15, 0x0, 0x5, 0x0) r16 = syz_open_dev$audion(&(0x7f0000000fc0)='/dev/audio#\x00', 0x9, 0x400000) getpeername$netrom(r16, &(0x7f0000001000)={{0x3, @bcast}, [@bcast, @null, @default, @netrom, @null, @default, @null, @rose]}, &(0x7f0000001080)=0x48) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f00000010c0)={0x1, {0x0, 0x1c9c380}, 0x7f, 0x80000000}) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000001100)={0x40, 0x20, 0x0, 0x5}) [ 218.258885] chnl_net:caif_netlink_parms(): no params data found [ 218.273240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 218.280143] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.312715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.338274] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.356787] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.376985] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 218.407764] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.430624] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.438322] team0: Port device team_slave_0 added [ 218.443718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.454800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.463034] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.470051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.499626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.509882] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.519091] team0: Port device team_slave_1 added 00:31:45 executing program 5: arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xfffffffffffffff8, 0x18001) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {0x77359400}}) r1 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x10) sendto$netrom(r1, &(0x7f0000000140)="8ef5abf3b6cba674b17ed35a5a40d982e346e6b1827a5e1cce23", 0x1a, 0x4008000, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x101081, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0x4, 0x0, &(0x7f0000000240)="0e5416ae", &(0x7f0000000280), 0x1, 0x0, 0x55, 0x56, &(0x7f00000002c0)="16cdcbd085ff59c31285f0a450d7c92ec8476b1ae9f2922eb51ff959921483bd215143ead7b4d7a9cfb4df83c7aa619660fe0a415b8ceac2e9ab20386919e84f2c39bccba035a4f0d5bb8098d93a8cd893c3905527", &(0x7f0000000340)="fe47d60931ef3a49a04baa80b2b945fa5c0b4d1394877ef807e96ccdd62d89ed78eee64b71300b8937d5221b367fc751d67a021899d5785f8767e4fe1dcdb15d4808faf50acc702c29f658b046379678b811b2598e7d"}, 0x40) recvfrom$unix(r0, &(0x7f0000000400)=""/130, 0x82, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000004c0)={0x8, 0x7fff, 0x5, 0x6}) r3 = socket(0x11, 0x5, 0x1f) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) getsockname$unix(r1, &(0x7f0000000580), &(0x7f0000000600)=0x6e) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000640)='/dev/urandom\x00', 0x100, 0x0) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000680)='trusted.overlay.nlink\x00', &(0x7f00000006c0)={'U-', 0x8000}, 0x28, 0x2) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000700)='hwsim0\x00') syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) syz_mount_image$vfat(&(0x7f0000000740)='vfat\x00', &(0x7f0000000780)='./file0/file0/file0\x00', 0x0, 0x1, &(0x7f0000000840)=[{&(0x7f00000007c0)="654506385352037da703a445d9349721031cc9f184f7518d76a12c40a6880dececae2d90f1e9417165968d0b66323a9edb298947b9b49d1bea22d891567a6c95492e1df6c05898a24b2cd68c59aca6cf4826cd8f98f354578b96269a7c68514aed9789c0a4fb1cc4", 0x68, 0x4}], 0x40, &(0x7f0000000880)={[{@rodir='rodir'}], [{@smackfshat={'smackfshat', 0x3d, ')['}}, {@subj_user={'subj_user'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/snd/midiC#D#\x00'}}]}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TIOCSISO7816(r5, 0xc0285443, &(0x7f0000000900)={0x200, 0x3, 0x5, 0x7, 0x1}) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dsp\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x8000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000980)={0x30000004}) r7 = syz_open_dev$media(&(0x7f00000009c0)='/dev/media#\x00', 0x8, 0x10080) ioctl$CAPI_GET_FLAGS(r7, 0x80044323, &(0x7f0000000a00)) lsetxattr(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)=@known='system.sockprotoname\x00', &(0x7f0000000ac0)='vfat\x00', 0x5, 0x2) socket$inet6(0xa, 0xa, 0x8) r8 = syz_open_dev$dmmidi(&(0x7f0000000b00)='/dev/dmmidi#\x00', 0x29, 0x880) ioctl$CAPI_MANUFACTURER_CMD(r8, 0xc0104320, &(0x7f0000000b80)={0x3, &(0x7f0000000b40)="5946262c99699a93dc90ff045a20b189dc80807f9d94e75a9835bc9dca76d5"}) [ 218.549338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.559437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.570235] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.577004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.590443] IPVS: ftp: loaded support on port[0] = 21 [ 218.600938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 218.613618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.624107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.640601] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.647788] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.656238] device bridge_slave_0 entered promiscuous mode [ 218.664047] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.670960] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.681607] device bridge_slave_1 entered promiscuous mode [ 218.689604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.704329] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 218.768231] device hsr_slave_0 entered promiscuous mode [ 218.815561] device hsr_slave_1 entered promiscuous mode [ 218.895965] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 218.903550] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 218.912282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.928158] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 218.948077] IPVS: ftp: loaded support on port[0] = 21 [ 218.958897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.968187] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.977923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.989938] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.001044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.029918] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.057653] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.067228] team0: Port device team_slave_0 added [ 219.073351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.083993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.093528] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.101914] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 219.116971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.129055] team0: Port device team_slave_1 added [ 219.135044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.143224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.163701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 219.179526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.191470] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.212339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.220373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.230210] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 219.236570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.310105] device hsr_slave_0 entered promiscuous mode [ 219.355623] device hsr_slave_1 entered promiscuous mode [ 219.436628] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.454363] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.462563] chnl_net:caif_netlink_parms(): no params data found [ 219.493354] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 219.604273] chnl_net:caif_netlink_parms(): no params data found [ 219.615196] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.622667] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.630313] device bridge_slave_0 entered promiscuous mode [ 219.639813] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.646850] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.653921] device bridge_slave_1 entered promiscuous mode [ 219.689590] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.700582] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.712572] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.723828] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.751103] chnl_net:caif_netlink_parms(): no params data found [ 219.803068] audit: type=1400 audit(1569889906.267:38): avc: denied { associate } for pid=8058 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 219.856979] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.864714] team0: Port device team_slave_0 added [ 219.871181] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.879524] team0: Port device team_slave_1 added [ 219.884661] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.898333] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.907891] device bridge_slave_0 entered promiscuous mode [ 219.921836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.930858] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.938763] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.946065] device bridge_slave_0 entered promiscuous mode [ 219.953195] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.964345] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.001058] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.013756] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.024149] audit: type=1400 audit(1569889906.497:39): avc: denied { create } for pid=8079 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:31:46 executing program 0: mknod(&(0x7f0000000300)='./bus\x00', 0x1001040, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0xb00, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x81) creat(&(0x7f00000001c0)='./bus\x00', 0x0) [ 220.058093] device bridge_slave_1 entered promiscuous mode [ 220.064571] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.072934] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.081723] device bridge_slave_1 entered promiscuous mode [ 220.090025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.171009] device hsr_slave_0 entered promiscuous mode [ 220.225659] device hsr_slave_1 entered promiscuous mode [ 220.289327] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.299895] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.310332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.323025] bond0: Enslaving bond_slave_0 as an active interface with an up link 00:31:46 executing program 0: r0 = socket$inet(0x2, 0x80a, 0x0) r1 = socket$inet(0x2, 0x80a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x1e0}, {0x0, 0xfffffffffffffd70}, {0x0, 0xffffffffffffffa0}, {&(0x7f0000000100)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b5080da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531bfdfe5cb19ff15d6d891a92efa823a3c231ea82fdf0e7fcf567bf50600a243422", 0xa5}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) [ 220.340504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.348760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.359596] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.378875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.392275] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 220.400592] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.408484] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.423439] bond0: Enslaving bond_slave_1 as an active interface with an up link 00:31:46 executing program 0: mkdir(&(0x7f0000005080)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='I', 0x1}], 0x1, 0x0) lseek(r0, 0x0, 0x4) [ 220.450254] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.459042] ptrace attach of "/root/syz-executor.0"[8088] was attempted by "/root/syz-executor.0"[8089] [ 220.462813] team0: Port device team_slave_0 added [ 220.485650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 00:31:47 executing program 0: [ 220.510386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.523480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.531710] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.538133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.546182] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.556130] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.563343] team0: Port device team_slave_1 added [ 220.577693] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.597878] team0: Port device team_slave_0 added 00:31:47 executing program 0: [ 220.620916] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.639176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.650049] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.659537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.667754] team0: Port device team_slave_1 added [ 220.673329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.694932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.710136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 00:31:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) pwrite64(r1, &(0x7f0000000380)="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", 0x282, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000280)) [ 220.727054] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.735675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.743717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.753501] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.759969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.775435] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.784362] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.797356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.814786] audit: type=1400 audit(1569889907.277:40): avc: denied { map } for pid=8098 comm="syz-executor.0" path=2F6D656D66643AB3202864656C6574656429 dev="tmpfs" ino=27945 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 220.888138] device hsr_slave_0 entered promiscuous mode [ 220.919579] device hsr_slave_1 entered promiscuous mode [ 220.985801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.993039] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.001203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.008499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.016155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.026825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 00:31:47 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) dup2(r1, r0) clone(0xf102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) readv(r3, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/53, 0x35}], 0x1) fcntl$setstatus(r3, 0x4, 0x800) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) tkill(r2, 0x1000000000015) [ 221.035912] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.042706] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.087978] device hsr_slave_0 entered promiscuous mode [ 221.145704] device hsr_slave_1 entered promiscuous mode [ 221.185772] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.193145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.205549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.215803] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.230060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.240322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.248385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.257764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.265792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.274024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.282400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.290423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.298964] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.309130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.322206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.332919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.342719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.351120] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.357572] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.364790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.372551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.380119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.395674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.404893] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.416618] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.426368] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.441534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.450581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.459669] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.466117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.476326] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.484905] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.500429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.520688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.531385] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.543927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.553971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.563614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.571953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.580771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.588987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.601577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.609891] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.630467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.639905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.652524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.661953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.674535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.685946] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.719493] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.726843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.739322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.749664] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.756817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.773866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.784457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.799578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.814811] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 00:31:48 executing program 1: r0 = socket(0x2, 0xc003, 0x6) connect$unix(r0, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x10) write(r0, &(0x7f0000000200)="9e3eaa467f0000000004bf9aab4230400f76000003d0459370410510fa651c1ece0efdd308e6b7ca", 0x28) [ 221.830662] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.852502] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.874586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.902270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.919809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.930198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.942550] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.949087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.963821] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.978775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.989841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.006891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.025687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.036766] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.047912] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.059708] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.068908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.082708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.091758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.104586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.113926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.125788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.134402] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.141303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.150128] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.161364] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.171240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.190868] 8021q: adding VLAN 0 to HW filter on device team0 00:31:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x13e, 0x0, [0x10]}) [ 222.202813] audit: type=1400 audit(1569889908.667:41): avc: denied { create } for pid=8128 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 222.234455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.261383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.272580] audit: type=1400 audit(1569889908.667:42): avc: denied { write } for pid=8128 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 222.277983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.310972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.319557] audit: type=1400 audit(1569889908.667:43): avc: denied { read } for pid=8128 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 222.323701] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 222.348176] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.380888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.393910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.411181] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.418764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.419406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.441322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.450189] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.457665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.471530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.486043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.497050] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.507451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.516001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.523657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.534755] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.543544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.551895] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.558651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.566885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.578214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.586360] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.594362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.601424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.609603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.621367] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.631101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.641271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.652072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.660177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.669635] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.681375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.691332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.699562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.707737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.719756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.729742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.740705] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.748962] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.766512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.776438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.784251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.793143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.802176] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.812197] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.821460] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 222.830113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.841207] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.848479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.857870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.866195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.874186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.882444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.891196] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.900019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.910029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.918223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.928918] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 222.935934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.946459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 222.957547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.968928] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 222.977070] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.986039] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.997198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.010981] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.024064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.031256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.039752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.047586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.059073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.066968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.074869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.090209] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.099449] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.124979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.136334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.150387] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.159986] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.167869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 00:31:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0xe, 0xffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r2 = fcntl$getown(r0, 0x9) r3 = getpgid(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r4 = socket$inet6(0xa, 0x7, 0x3) ioctl(r4, 0x5a, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file1\x00', 0xe005, 0x1, &(0x7f0000000300)=[{&(0x7f0000001180)="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", 0x1000, 0xfffffffffffffb7d}], 0x1010802, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x10404, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0/file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000002180)=ANY=[@ANYBLOB="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"], @ANYRES64=r2]) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r1, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000001, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c8, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xd, 0x1, 0x89, 0x20003, 0xca, 0xca2c}) r7 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, @perf_bp, 0x1e, 0x0, 0x0, 0x4}, 0x0, 0x1, r6, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x2080000000, 0xfffffffffefffc01, 0x9}, 0xfffffffffffffe5f) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0xa2081, 0x0) mkdirat(r5, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44) fchdir(r7) [ 223.210863] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.243805] 8021q: adding VLAN 0 to HW filter on device batadv0 00:31:49 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0001000009f50004fbff65608000efff0000000000ff010700ff09ffffffffff45"]}) [ 223.367227] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 223.460144] hrtimer: interrupt took 77818 ns [ 223.471451] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:31:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="e7dc6e3b38d8e20a65497da361aa0ad7ddc70fc984dd3e11c02d11f09f0b543d0b8bf8af1b1fbb86b7aa2212f4e82276d8177db64569030f5dcf08cf0a10ba8cb7f67c50a62942bdc85d6cf6350d5da8f73c2ba1ef967d5119872a2c03192b3099882662bf2e0ee1d8cacb9d86937cec687fc90c0cca8591c02a1bca4c25b0768fc2c0af03fdc247e67b", 0x8a, 0x40, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x4404) creat(0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) getpeername$packet(r2, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x14) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000000700), 0x1000000000000177, &(0x7f0000000780)=ANY=[@ANYBLOB="24000000000000000000000007000000071309e0000001ac14141dffffffffac14141c00000000001400000000000000000000000100000003000000000000001c00000000000000000000000800000010989994a8b2e5656f86a8e81bec1256c9832b301cba14c38fe35e4b6dc300ffcf23120f18f647a766b1c1de57701a0089819d0aa01e0f4f4c5b234c5bb4c205c7b3888b264e", @ANYRES32=r3, @ANYBLOB="0000a97ce000000200000000140000000000000000000000010000000100008000000000540000000000000000000000070000008643000000080012b6785195812702b069340da702f8696d0108177967cef5a00210f1dfe799b05b08e138a0122ec481da05020059010e4ab1283ab807a9c15e3e61740000000000380000000000000000000000070000000717800000e88d7f000001e0000002e0000002ac1e0001830f03e0000002ac141423ac1414bb0000110000000000000000000000010000000900000000000000140000000000000000000000010000000200000000000000"], 0x17e}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0x1ff, 0xb3, 0x0, 'queue1\x00', 0x7ffd}) 00:31:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x7585) fallocate(r1, 0x0, 0x0, 0x10001) fallocate(r0, 0x8, 0x0, 0x8000) 00:31:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r3, &(0x7f0000000200), 0x31b, 0x140010006, 0x0) semget$private(0x0, 0x0, 0x2) r4 = fcntl$dupfd(r3, 0x0, r3) pipe(0x0) bind$bt_rfcomm(r4, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) write$P9_RXATTRWALK(r4, &(0x7f0000000140)={0xf, 0x9}, 0xf) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) fallocate(0xffffffffffffffff, 0xbb8f0aac3b51e464, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x0) 00:31:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000480)="40fb684a3266d8b59755511498b6ddd9f614553f3bf769cfa2a77df2a8dcfcf74b4e11ed71c547ebb60a059c501e604179457143e3acff8a45d7547d077744f1debc71091731d34e4a5d0ffadae6ba4b90c227a99ec0f44461cff58c9f2daba5ba4955fb0b7de47aaaac771b50dfbb73df") ptrace$cont(0x9, r0, 0x0, 0x0) 00:31:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0xd99, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 223.662476] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 00:31:50 executing program 2: socket$inet(0x2, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) 00:31:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x132}) 00:31:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x7585) fallocate(r1, 0x0, 0x0, 0x10001) fallocate(r0, 0x8, 0x0, 0x8000) 00:31:50 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = syz_open_dev$usb(0x0, 0xdba, 0x1) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, 0x0) r1 = getpid() memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r3, 0x2) r4 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x13560b4) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1f7}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:31:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x23) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66576c65308b02d282c300d1015b717811b957c0443849dcf76acd68e9f586d4610b9ecca85c7d5c0707e8bf000000"], 0x34) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe459f070") write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [], 0xa, "39980cfd42119cc4e1040300"/25}, 0x24) 00:31:50 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:50 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1c4, 0x0, 0x0, 0xfffffffffffffd92) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0xfffffd43) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) read$eventfd(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f0000000440)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 00:31:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffeb9, 0x0, 0x229, 0x0, 0x7f}}], 0x0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='limits\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 00:31:51 executing program 0: connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x400006e, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797ab867b1917840"], 0x9) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) [ 224.584935] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:31:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00'}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r2, 0x8921, &(0x7f0000000000)={'syz_tun\x00', 0x0}) 00:31:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="e7dc6e3b38d8e20a65497da361aa0ad7ddc70fc984dd3e11c02d11f09f0b543d0b8bf8af1b1fbb86b7aa2212f4e82276d8177db64569030f5dcf08cf0a10ba8cb7f67c50a62942bdc85d6cf6350d5da8f73c2ba1ef967d5119872a2c03192b3099882662bf2e0ee1d8cacb9d86937cec687fc90c0cca8591c02a1bca4c25b0768fc2c0af03fdc247e67b", 0x8a, 0x40, 0x0, 0x0) creat(0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) getpeername$packet(r2, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x14) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000000700), 0x1000000000000177, &(0x7f0000000780)=ANY=[@ANYBLOB="24000000000000000000000007000000071309e0000001ac14141dffffffffac14141c00000000001400000000000000000000000100000003000000000000001c00000000000000000000000800000010989994a8b2e5656f86a8e81bec1256c9832b301cba14c38fe35e4b6dc300ffcf23120f18f647a766b1c1de57701a0089819d0aa01e0f4f4c5b234c5bb4c205c7b3888b264e", @ANYRES32=r3, @ANYBLOB="0000a97ce000000200000000140000000000000000000000010000000100008000000000540000000000000000000000070000008643000000080012b6785195812702b069340da702f8696d0108177967cef5a00210f1dfe799b05b08e138a0122ec481da05020059010e4ab1283ab807a9c15e3e61740000000000380000000000000000000000070000000717800000e88d7f000001e0000002e0000002ac1e0001830f03e0000002ac141423ac1414bb0000110000000000000000000000010000000900000000000000140000000000000000000000010000000200000000000000"], 0x17e}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0x1ff, 0xb3, 0x0, 'queue1\x00', 0x7ffd}) 00:31:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) creat(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000a00)='9p\x00', 0x0, 0x0) 00:31:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="16"]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) 00:31:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:51 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65302047504c73656d30bc776c616e3126206574683175736572a85e6b657972696e672e202f6465762f696e7075742f6576656e742300200eff0f42b87f18de675c509928faa208a43a85df608ddd9d1151a7759e485f63e33f5076fcc83bf65bc88907b1649b683e8db72c969494ce949f02e242cd3037258ea756d1e6ea2f104a053d6f4e104ac06367a203907730cb3404f80ac1c5dd2a2e899f8726993f8cca3f3fe6e4837ab641cb5dba3227c45c4e2b0cede6718bbaa19cc1163278eb653e7635f7dc12fcac721bef5c13c97ca2ba3621ec3a284ccc14fe8a"], 0xe4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpuret.memory_pressure\x00\x8bEY\xd0\x1b\x05\xa2\bG\xdb\xd8\xee\x04=\x17\xae\x89\xbdA\x8a\x1d,v[v1r%\xd8w\x8f\xe7\xcc\n\x93\x06:\xef~\xa7yv\v\xdb\xc62e\xe3\x00%\xa4-\xdb\x8a1\x9c\x89\xf3\xbd\x8aW\xd9\xa30xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a00)=ANY=[@ANYBLOB="020a000007000000eb0089000028220005001a00f4f38aaf1e5a5838f67645194b56cb3ecadc64d15f4b154e9623446d3d3f7a0002009c000000000000009aabaeb495b20be31200000000000000090056d52ddbc9ec01ee76caff000c554881000200ae2b8f45be7e6d66f67a770f4932f19e238198993f9d0d0394d5b2281f510f76d6f24870648f499aee55b6ef453762737961ea8b620fa27a77a1e50803bdddbdd909212a8c117722e1b23435fd64b0fafbf030a2955142dfda21e80d1867b89a103949fd0634ad0c25f3cb553daa103b66608d594050272cb289d190b7d30506fe07b367ce96d9904c75f27421fe466c0fda9c728680544af8167be861cde60aea84c1adbbe13bd80987d564379e7c33b97d888ad52d47c2647cd2383fc7033acae7f2b664a93032fa43f5e5690f12fdfa00f903f22e819e855dd435e016fccc389d22b2f376cc2a7c60bbbc7a5ca55f8159ce1bcaa59f1fb147fc005739b05d6443ceca194b04c5f9d330efa2b7cb7f14053d15035022dd2f50d720710766d1ac7d899a7e7d66ee83bc33b9f16a460ff012fa1e79d6cd9a8059ac09fa8f0e5a0302b3154d2d077f423e453439b70080d55fb921c623fcdbeefe2b3d9940277d04f88f4ee51815471e73dc329f360a05e65b7dd276080000000000090000008e681bca6c72a6fc63a327066cd7c6d0ef0a1324699052f14923d247fa583a3488408ef46ca22bf5e68045608d3cc6ea007fdaca1951ff01000000000000e9fff3d1602a4c8c6bff25e9998902fb1b486ecda1303ed6a2db0436d6189bc77414827c5fa71109482043e23a293baef7f938df2cb57bc8409b145a621f5c72dd4e59cd5aeb3d0864d8e42ce6755dfd36af4f9e43f29ebbabf9be202d583901ebc1526f7d9c07d9f2cc499e01eaf53a663e2123f5ad5233308a623ba3f03acaca8b9cf61d7c33b12f745aef814fe6b4b927fe098f0c81a2c3a3b29e2f1b9c5b77caf5b0e589fd4ac6ab9d5e6ae660e7bc04016e2f287ae1301364b8cf30572bfa45e3040198edcf35cb12d084d2a758926524d9281880ff2055d4e40f0000013b20ee9390e1b7769b132081efe22877563a81814e359d8d217309a6f17efe5b26d2656b70cdee6fe5b0407bd9824512784b5869f28a9b4a717d2e5e08f636d05a17d99ebe3ed57481b2126ba636655324cd8fd206d8ece52ef24344df1c1402118a3b1ef834ae7e35b1120b6d2a0c5122ca0ad654e06d4f18370ba924411a3920904a9744f13a17623a1bba12155ed59b7a7e5f19d95c14e18a283227df645fa5a48f467a24635ddd257ba7123aea98f48cb7a5daf26bf954c2e5fb9cf8553a707fb81dd22ba4d85aed5018cbf28f65517006e994653fb88a7ef44ddcbd199c18ee56a9fdbd018a8bb952de1986bce95c98f42e79881d46520b4a571586fba50a11d1e3e06d4f8f1ff30036fc4dbd9839a60d1705744e72b71ea09eedf7c843a65f71d30648b8e031e2106312772f0000000000000000007d7a5ee8871b4b1a53380f70341ed85377fa03ff9c20d69b90816c7fd9243eb8a61e48d79287198f03e0888ed676fa6e8b46346179f468ce3ed01d4183109242b96c6c4ff4f454c877bc06d853b2ca938eca0032449d1e0f7eff5a0856126d03ee8267c9c783f7d1d9304a2a91bdaa90cac1ec4903f4324cbf792e4281c48555144763995669323f5747914523beedc875a9ed57c7316eeba1d3baa8a10439766ddbe6294913a657243c30b4291e14f12416fbe8428f576e5d426e06918b0ab04cde2645968213fee2ea21927092245a0cb8531c9bdf15e4159a0207fd5954dccc2699a58cabd3972fba39e57bf52af0ef64d070b8cf0b522100b4373db56b2aa5f60a23a49228ab5b54adc71dba0bdffa68a3dd8ea07e020ec7bea81de978b7259c4145b343f75b5f1305000000d85e1a9b9385a046a3b443813da5dcd97d35eb706a34afb7ec0200c3f6b60adea13b27bcdf04a8f1d7eac5d1d37c6eb4e29c7ab784264799ae3d4fce14ba765cccbe4c0982c36d1fa0b5f4b8af391fa9c414bf8da051f3eb78b539936b4657030000001dc53186c027a89bf2b392661d2466d0acbe4ab6ce11b98403a7ec2bfa6a73656a02a390acb8989a933638c900000000000000000000000000002d559d7242a89ae0a7434af9e173bba9d7d7e2f2eb1314e06cd81c1d002af3500000000000000000000000002000007f4646941d8ba2709b4c9fbce6c5626fafc82fe766b3cb162114bb62b26da44ef82429a6124024860bb19b53be0edecc278f89d27304ec841a5923d5e815a4abd4ed952f59eb848f149c22c7c7faae5e14913dc9a86e87cac9fd09689682dabfb450e6822a335b06f5e193c8d45a88620e0b4fa522aadd745a2f8c5ecdea161d99609be033f03ab301e1b74ba28e07e75a8c6f58d5fa04375b2cccd6f6b59982ba4ebea4f5fd7fc9b931ae8bfe58d686908f6cac7551aea72cc09ee614709cd0615d2468b613be81b1078e42e6521318e51f58eb9b1e53cfb12787c1abc69b0a2f60b3a2f8052a2e77f70c75569b03ad4b3cc889ab8156d7f61fe841de768a87d8c640f89f5f71bb805d21bf37bb6e9652d66cf504ebe1ac8afdcbfd48f6f787edd334ef750c24e4ca5ce433af7ecb2157ec8257c24100f015fd104d0b1b6a319132f49f53fa57ac3c000000000000000000000000f549112be35144fdffb582c4ade9cf25174d92609244628d491e8953cd972be0972bb0c10335b20cc0b5278e9d728692d90c7ff1f192816d173dfc880971bd30be28d29ec949be1b965c925b34cb6bd754012cdf4db4599668dfd46eb57832d4954e70080738a117e617fff2d578ace26a5277cbd0ab71438056d122f49367b790cecaa3c13e102f9dd204006a68a9a53aa9bd2ea02649e5bda80b1ef7ab1e814143b8acce74683dee820000000000000000"], 0x38}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x3e9292efac6a7b6, 0x0) 00:31:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 225.297659] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:31:51 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='+']}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) [ 225.377413] 9pnet_virtio: no channels available for device ./file0 00:31:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:31:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) creat(&(0x7f0000002440)='./file0\x00', 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000000700), 0x1000000000000177, &(0x7f0000000780)=ANY=[@ANYBLOB="24000000000000000000000007000000071309e0000001ac14141dffffffffac14141c00000000001400000000000000000000000100000003000000000000001c00000000000000000000000800000010989994a8b2e5656f86a8e81bec1256c9832b301cba14c38fe35e4b6dc300ffcf23120f18f647a766b1c1de57701a0089819d0aa01e0f4f4c5b234c5bb4c205c7b3888b264e", @ANYRES32, @ANYBLOB="0000a97ce000000200000000140000000000000000000000010000000100008000000000540000000000000000000000070000008643000000080012b6785195812702b069340da702f8696d0108177967cef5a00210f1dfe799b05b08e138a0122ec481da05020059010e4ab1283ab807a9c15e3e61740000000000380000000000000000000000070000000717800000e88d7f000001e0000002e0000002ac1e0001830f03e0000002ac141423ac1414bb0000110000000000000000000000010000000900000000000000140000000000000000000000010000000200000000000000"], 0x17e}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000000)={0x1ff, 0xb3, 0x0, 'queue1\x00', 0x7ffd}) [ 225.453410] audit: type=1400 audit(1569889911.917:44): avc: denied { mac_admin } for pid=8290 comm="syz-executor.1" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 00:31:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000040)='..', &(0x7f00000000c0)='./file0\x00') r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x4000000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) inotify_init() inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0xc) 00:31:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000480)='./control\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000300000000000019078ac2314bbac1414000302907800000000450000000000000000000000ac2314aaac1414003fc5c26744fca028d9f4fbdabd2bf244bb47da843e2156cddf30f9cc6df986514bd5074ffad7496b5313169a12a9747934e7340eb1bd4cc2d89fde1e5ca44135c16ddea269dc51f17b5c38972e61b4807174fa1d881205b8fb3850d6ee51b6681ae3f1c5af778e0078cfa1b33ffd72735481eae9fe0239fae268c02f3f"], 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x10000000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6d643000967e256589b6e0d952f1e0e93b789e1cec5f7349c3c14da642cb90dbcb4515c8aba83c4a69dd17045f60133a3c91c1b23d3750"], &(0x7f00000004c0)='.//ile0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x100000, &(0x7f0000000540)='overlay\x00') syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x2) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x4}, 0x10) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmsg(r5, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000240)=""/184, 0xb8}], 0x1}, 0x0) r6 = fcntl$dupfd(r0, 0x0, r5) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000800)) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.//ile0\x00', 0x14000, 0x28) renameat(r2, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000780)='./file0/f.le.\x00') listen(0xffffffffffffffff, 0x11) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000080)=""/56, 0x38}, {&(0x7f0000000200)=""/249, 0xf9}], 0x3) rmdir(&(0x7f0000000000)='./control\x00') r7 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x4, 0x10000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000328bd7000ffdbdf251200000018000600080001000000000008000100040000000400020014000600040002000800010003000000040002000c00090008000100070000000c0006000800010005000000"], 0x58}, 0x1, 0x0, 0x0, 0x2}, 0x0) rmdir(&(0x7f0000000040)='./control\x00') 00:31:52 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0xe6c}, {&(0x7f0000000240)=""/147, 0x71f}], 0x2, &(0x7f0000002740)=""/218, 0x52}}], 0x400008c, 0x2, &(0x7f0000002e40)={0x77359400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0xffffffffffffff0e, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:31:52 executing program 1: read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) gettid() connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) getuid() getresgid(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) flock(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) [ 225.872410] overlayfs: filesystem on './file0' not supported as upperdir 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) 00:31:52 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000580)={@empty, @local, [{}], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x10, 0x0, 0x0, @dev, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "31daec", 0x0, "abf308"}}}}}}}, 0x0) 00:31:52 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) setgid(0x0) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x7585) fallocate(r1, 0x0, 0x0, 0x10001) fallocate(r0, 0x8, 0x0, 0x8000) 00:31:52 executing program 0: 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) [ 226.332929] overlayfs: filesystem on './file0' not supported as upperdir 00:31:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000480)='./control\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000300000000000019078ac2314bbac1414000302907800000000450000000000000000000000ac2314aaac1414003fc5c26744fca028d9f4fbdabd2bf244bb47da843e2156cddf30f9cc6df986514bd5074ffad7496b5313169a12a9747934e7340eb1bd4cc2d89fde1e5ca44135c16ddea269dc51f17b5c38972e61b4807174fa1d881205b8fb3850d6ee51b6681ae3f1c5af778e0078cfa1b33ffd72735481eae9fe0239fae268c02f3f"], 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x10000000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6d643000967e256589b6e0d952f1e0e93b789e1cec5f7349c3c14da642cb90dbcb4515c8aba83c4a69dd17045f60133a3c91c1b23d3750"], &(0x7f00000004c0)='.//ile0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x100000, &(0x7f0000000540)='overlay\x00') syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x2) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x4}, 0x10) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmsg(r5, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000240)=""/184, 0xb8}], 0x1}, 0x0) r6 = fcntl$dupfd(r0, 0x0, r5) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000800)) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.//ile0\x00', 0x14000, 0x28) renameat(r2, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000780)='./file0/f.le.\x00') listen(0xffffffffffffffff, 0x11) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000080)=""/56, 0x38}, {&(0x7f0000000200)=""/249, 0xf9}], 0x3) rmdir(&(0x7f0000000000)='./control\x00') r7 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x4, 0x10000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000328bd7000ffdbdf251200000018000600080001000000000008000100040000000400020014000600040002000800010003000000040002000c00090008000100070000000c0006000800010005000000"], 0x58}, 0x1, 0x0, 0x0, 0x2}, 0x0) rmdir(&(0x7f0000000040)='./control\x00') 00:31:52 executing program 2: 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000480)='./control\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800450000300000000000019078ac2314bbac1414000302907800000000450000000000000000000000ac2314aaac1414003fc5c26744fca028d9f4fbdabd2bf244bb47da843e2156cddf30f9cc6df986514bd5074ffad7496b5313169a12a9747934e7340eb1bd4cc2d89fde1e5ca44135c16ddea269dc51f17b5c38972e61b4807174fa1d881205b8fb3850d6ee51b6681ae3f1c5af778e0078cfa1b33ffd72735481eae9fe0239fae268c02f3f"], 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x10000000) syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2f6465762f6d643000967e256589b6e0d952f1e0e93b789e1cec5f7349c3c14da642cb90dbcb4515c8aba83c4a69dd17045f60133a3c91c1b23d3750"], &(0x7f00000004c0)='.//ile0\x00', &(0x7f0000000500)='rpc_pipefs\x00', 0x100000, &(0x7f0000000540)='overlay\x00') syz_open_dev$mice(&(0x7f0000000740)='/dev/input/mice\x00', 0x0, 0x2) r3 = socket$inet6(0xa, 0x2, 0x0) close(r3) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x4}, 0x10) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r5 = accept$alg(r4, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r5, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmsg(r5, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000240)=""/184, 0xb8}], 0x1}, 0x0) r6 = fcntl$dupfd(r0, 0x0, r5) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000800)) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.//ile0\x00', 0x14000, 0x28) renameat(r2, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, &(0x7f0000000780)='./file0/f.le.\x00') listen(0xffffffffffffffff, 0x11) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000100)=""/252, 0xfc}, {&(0x7f0000000080)=""/56, 0x38}, {&(0x7f0000000200)=""/249, 0xf9}], 0x3) rmdir(&(0x7f0000000000)='./control\x00') r7 = syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x4, 0x10000) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000600)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000328bd7000ffdbdf251200000018000600080001000000000008000100040000000400020014000600040002000800010003000000040002000c00090008000100070000000c0006000800010005000000"], 0x58}, 0x1, 0x0, 0x0, 0x2}, 0x0) rmdir(&(0x7f0000000040)='./control\x00') 00:31:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 00:31:52 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000192ff0)=[{}]}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r2, r1) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, 0xffffffffffffffff, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, 0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000006c0)={0x148, 0x0, 0x0, [{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xba2b, 0x0, 0x1ff}}}, {{0x0, 0x3, 0x0, 0x0, 0x10001, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xee01, 0x0, 0x2}}, {0x0, 0xfffffffffffffc00, 0x8, 0x0, '/lonodev'}}]}, 0x148) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) r5 = getegid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000000a00)={0x168, 0x0, 0x0, [{{}, {0x0, 0x0, 0xf, 0x0, '/dev/sequencer\x00'}}, {{0x0, 0x0, 0x542ac762, 0x0, 0x0, 0x0, {0x1, 0x8, 0x0, 0x350, 0x0, 0x7, 0x0, 0x4d32, 0x0, 0x3e67, 0x0, 0x0, r5, 0x8}}, {0x4, 0x0, 0x11, 0x5, 'vboxnet1^useruser'}}]}, 0x168) getgroups(0x4, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0xee01]) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 00:31:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="e7dc6e3b38d8e20a65497da361aa0ad7ddc70fc984dd3e11c02d11f09f0b543d0b8bf8af1b1fbb86b7aa2212f4e82276d8177db64569030f5dcf08cf0a10ba8cb7f67c50a62942bdc85d6cf6350d5da8f73c2ba1ef967d5119872a2c03192b3099882662bf2e0ee1d8cacb9d86937cec687fc90c0cca8591c02a1bca4c25b0768fc2c0af03fdc247e67b", 0x8a, 0x40, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x4404) creat(0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) getpeername$packet(r2, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x14) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)={&(0x7f0000000280)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000000700), 0x1000000000000177, &(0x7f0000000780)=ANY=[@ANYBLOB="24000000000000000000000007000000071309e0000001ac14141dffffffffac14141c00000000001400000000000000000000000100000003000000000000001c00000000000000000000000800000010989994a8b2e5656f86a8e81bec1256c9832b301cba14c38fe35e4b6dc300ffcf23120f18f647a766b1c1de57701a0089819d0aa01e0f4f4c5b234c5bb4c205c7b3888b264e", @ANYRES32=r3, @ANYBLOB="0000a97ce000000200000000140000000000000000000000010000000100008000000000540000000000000000000000070000008643000000080012b6785195812702b069340da702f8696d0108177967cef5a00210f1dfe799b05b08e138a0122ec481da05020059010e4ab1283ab807a9c15e3e61740000000000380000000000000000000000070000000717800000e88d7f000001e0000002e0000002ac1e0001830f03e0000002ac141423ac1414bb0000110000000000000000000000010000000900000000000000140000000000000000000000010000000200000000000000"], 0x17e}, 0x8000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0x1ff, 0xb3, 0x0, 'queue1\x00', 0x7ffd}) 00:31:53 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f00000000c0)) 00:31:53 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f00000000c0)) 00:31:53 executing program 1: [ 226.782735] overlayfs: filesystem on './file0' not supported as upperdir 00:31:53 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) r0 = gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f00000000c0)) [ 226.904510] overlayfs: filesystem on './file0' not supported as upperdir 00:31:53 executing program 3: 00:31:53 executing program 2: 00:31:53 executing program 1: 00:31:53 executing program 5: r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:53 executing program 1: 00:31:53 executing program 0: 00:31:53 executing program 4: 00:31:53 executing program 5: r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:53 executing program 3: 00:31:53 executing program 2: 00:31:53 executing program 4: 00:31:53 executing program 3: 00:31:53 executing program 2: 00:31:53 executing program 1: 00:31:53 executing program 5: r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:53 executing program 0: 00:31:54 executing program 4: 00:31:54 executing program 2: 00:31:54 executing program 3: 00:31:54 executing program 1: 00:31:54 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:54 executing program 4: 00:31:54 executing program 2: 00:31:54 executing program 0: 00:31:54 executing program 3: 00:31:54 executing program 1: 00:31:54 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:54 executing program 4: 00:31:54 executing program 3: syz_emit_ethernet(0x5eb, &(0x7f0000001600)={@random="9ec9f304074a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "131494", 0x5b5, 0x1d6, 0x0, @dev, @mcast2, {[], @gre={{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "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"}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0], "e207c29a990aaa3bb69d804a71fe008baccaeeb1e3239f27002f92c6d6ea32ac10d322027bbc51334ecc83c115639c9db442cb7684ad43c0989caaba12ac55007f91ff06791e8cdd161a52686dd9762959bb36891927e66f6bdee83b1960100d1049635ad0b37b512aacd22a37273d24feccc0eb3a9793eb3e95f9cb1125cc0ae7af1f6b7ce86fd767a7b71f476842acb7874e531bc2b39f72268b804fbb6a01b33b71e9b1820b6650c858f6c83056"}, {}, {}, {0x8, 0x6558, 0x0, "0daa4f25ad7b61831bf605d97adfa04f1d06034ed8d2d75e820df0fea26433881efc55e7f9b328511d686e8368b8db8094444277fdab96bbd8fea3da087c523480ae6deb1df747502e089efa26a70d0b49d778cd51dbad0393277cea0759766462880acd0ba11b56fc9a948edac6c18ea172cf0b332898da0d0da22643d9a69043955c0177197644f0d6129814291f9d"}}}}}}}, 0x0) 00:31:54 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x200000003, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6(0xa, 0x401000000001, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 00:31:54 executing program 2: 00:31:54 executing program 1: 00:31:54 executing program 2: 00:31:54 executing program 4: 00:31:54 executing program 3: 00:31:54 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:54 executing program 4: 00:31:54 executing program 1: 00:31:54 executing program 3: 00:31:54 executing program 2: 00:31:54 executing program 1: 00:31:55 executing program 0: 00:31:55 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:55 executing program 4: 00:31:55 executing program 3: 00:31:55 executing program 2: 00:31:55 executing program 1: 00:31:55 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:55 executing program 4: 00:31:55 executing program 3: 00:31:55 executing program 2: 00:31:55 executing program 0: 00:31:55 executing program 1: 00:31:55 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:55 executing program 2: 00:31:55 executing program 0: 00:31:55 executing program 3: 00:31:55 executing program 4: 00:31:55 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:55 executing program 1: 00:31:55 executing program 3: 00:31:55 executing program 4: 00:31:55 executing program 2: 00:31:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, &(0x7f0000000180)) setgid(0x0) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0x7585) fallocate(r1, 0x0, 0x0, 0x10001) fallocate(r0, 0x8, 0x0, 0x8000) 00:31:55 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:55 executing program 1: msgsnd(0x0, &(0x7f0000000080)={0x3}, 0x8, 0x0) msgsnd(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="03"], 0x1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)) 00:31:55 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) readahead(0xffffffffffffffff, 0x26a, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x9f, 0x7d, 0x0, {{0x0, 0x76, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/proc/capi/capi20\x00', 0xd, 'cgroupcpuset}', 0x12, '/proc/capi/capi20\x00', 0x12, '/proc/capi/capi20\x00'}, 0x14, 'ppp1posix_acl_access'}}, 0x9f) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRES16], 0x2) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) 00:31:55 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) socket$inet_smc(0x2b, 0x1, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b80)={r1, 0x0, 0x0, 0x1, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}, 0x20) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @local}}, 0x0, 0x6, 0x0, "95bf6c49c43a2cd038b82ce6eff5d84cde7afc1fa5b191d001c5a33ef1df783def9e21ead571577b4247b5f55940ec527e36b67b939eb2a97e0eb9c3c87fa09a1054c35c37ecb22300"}, 0xd8) setsockopt$inet_int(r3, 0x0, 0x19, &(0x7f0000000300)=0x8, 0x4) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r4 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x1f00000000000000, 0xcc, &(0x7f0000000000), 0x3c) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000640)={{0x84, @multicast2, 0x4e22, 0x4, 'wrr\x00', 0x28, 0x3f, 0x27}, {@broadcast, 0x0, 0x3, 0x0, 0x34a, 0xb0}}, 0x44) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={0x0}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000004c0)=0x4) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r5, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100)=""/149, 0x207a0cb3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000140)='nv\x00', 0xdfd8e18b4a1465b9) r7 = accept4(r6, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f0000000000)="b863aefe50757cb5430b887d7a41095e52042b10d6f0be906682eaf94df13c770a920fc148f68963452bb6c77ef69eb002150c41e1a61610038f", 0xffffffffffffffbc, 0x0, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r3, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000000)=@nfc, 0x9005, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x811e}, 0x300) 00:31:55 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000640)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x10, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@ndisc_ra}}}}}, 0x0) 00:31:56 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:31:56 executing program 1: r0 = socket(0x1e, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000010000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) 00:31:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) 00:31:56 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) 00:31:56 executing program 3: mknod(&(0x7f0000000080)='./bus\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) [ 229.669227] x_tables: eb_tables: snat target: only valid in nat table, not nat [ 229.691169] x_tables: eb_tables: snat target: only valid in nat table, not nat 00:31:56 executing program 0: r0 = shmget(0x0, 0x1000, 0x1a00, &(0x7f0000ffb000/0x1000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmctl$IPC_RMID(r0, 0x0) 00:31:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) seccomp(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x10200000006}]}) ioctl$KDSKBLED(r0, 0x80082102, 0x717000) 00:31:56 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) 00:31:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8}, 0x10) 00:31:56 executing program 0: pipe(&(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x1) 00:31:56 executing program 2: mknod(&(0x7f0000000080)='./bus\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x0) 00:31:56 executing program 4: 00:31:56 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f00000000c0)) 00:31:56 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="82022e2fac1400fe7d81afe4875733e0f2938404d118110e3851afc734a899f96f0b224ec765ed0e76d93c6b8a03b10820a58fe43bea7a07246ebf31c8062782813c8cefcfdb1bd4f9c0e36d58ab5879a62de67ee7fb584d49000000ed612e5ffe04fd83800b0331dd48d6fdc2ef47b4d2c38f575d8684cb24dd92f008c18dacb6584be734ee11e3b0270a8b4b75976198aaebdf1b7ebb57e75bb2dc6657ddac47a47e1d36a82818c528ea997e3ea944df0431b67f054d58015887bdf2c440abec43beaf656f9305d4729f7c40b3dffc9adc8360ac2ef1754c09b092cd0e67beab3b00b0c1b705f6b4300048c4c0db2c55a02a05961e2dcddadb9edd8a568f52cb79a546426da5d941f9866619b3982f064b23f1e1692c35dbdc77d3f79c942baa127aff0100004fcd03a94ea03300c70000000000000e0000000082d03e2c529735640124e1f43e6e7208e7e7e6012e502f8c067154339114617b7cb265694e8fd40bc122f0c1f35142ff223bf6b0288bab523caa977010878cc4bcee34f8c1228bb8356ba786fa54fff9b36d953a8b5e9f3bca4bfa199909059747eb8cc6ab6d53ccb5529266028483423441b612130222582e013b0dd482a1a3b1321b66723bfc142285e2a35bca651ee566676f770cb69579ec2c2c7dc52b61d74e5c9f6e081bf1306643019dde7a179f84a60f7b9e00612c02d9f0675c291b8bbdc2ba33eb2a946704765e4d8a4c723fc848be758d529ea008ec032c45b2d899333b0ab50ce898d45f366d1b90e386b6187cd638ddddda7122c490476d51611b5eae714704970311757a70a108e9cc55bcd13761f67959d7afbf57ce2aed0877503c0000000000000068f8da5611fe127eec2a05aacfa528ff851ef3f04661f3276ff6d0373045b332deb865429981cea3cf1eb819ff1a02c58472e7a100501784b0a3617086cdc36bba2ecfa4316052711aa1a58faee16252361f07de92c2bad9a5e5a2949cff30dcffd6cfdf6187159c3a9c463226239ebe7a55cba98c5904df7b178ce508befd2b7ac14e3533a2daee1aacc161984af45125c1aecf941bfb8a40c795a0f597ef88584ffb00000000"], 0x10) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000800)="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", 0xb8c}], 0x1) 00:31:56 executing program 0: syz_open_dev$vcsa(0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 00:31:56 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/uts\x00') 00:31:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xffffffff, 0x88302) write$P9_RSTATu(r0, &(0x7f0000000440)={0x9f, 0x7d, 0x0, {{0x0, 0x76, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12, '/proc/capi/capi20\x00', 0xd, 'cgroupcpuset}', 0x12, '/proc/capi/capi20\x00', 0x12, '/proc/capi/capi20\x00'}, 0x14, 'ppp1posix_acl_access'}}, 0x9f) 00:31:56 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r2, &(0x7f00000000c0)) 00:31:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 00:31:56 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) syz_open_dev$dspn(0x0, 0x0, 0x0) 00:31:57 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xdba, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000000)={0x48, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 00:31:57 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x10) write(r0, &(0x7f0000000bc0)="1e85df7bcd03", 0x6) 00:31:57 executing program 4: ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0xf000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) memfd_create(0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x6bcacdce3f8f6a06) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a8, 0x0) socket$netlink(0x10, 0x3, 0x4) 00:31:57 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r2, &(0x7f00000000c0)) [ 230.674255] vhci_hcd: default hub control req: 4800 v0000 i0000 l0 00:31:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) read(r1, &(0x7f0000000180)=""/105, 0x69) r2 = getpid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r0, r1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 00:31:57 executing program 2: 00:31:57 executing program 1: 00:31:57 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r2, &(0x7f00000000c0)) 00:31:57 executing program 3: 00:31:57 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:31:57 executing program 2: 00:31:57 executing program 3: 00:31:57 executing program 1: 00:31:57 executing program 0: 00:31:57 executing program 4: 00:31:57 executing program 3: 00:31:57 executing program 2: 00:31:57 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:31:57 executing program 1: 00:31:57 executing program 0: 00:31:57 executing program 2: 00:31:57 executing program 3: 00:31:57 executing program 1: 00:31:57 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:31:57 executing program 0: 00:31:57 executing program 4: 00:31:57 executing program 2: 00:31:58 executing program 3: 00:31:58 executing program 0: 00:31:58 executing program 1: 00:31:58 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, 0x0) 00:31:58 executing program 2: 00:31:58 executing program 4: 00:31:58 executing program 3: 00:31:58 executing program 0: 00:31:58 executing program 2: 00:31:58 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, 0x0) 00:31:58 executing program 1: 00:31:58 executing program 3: 00:31:58 executing program 4: 00:31:58 executing program 0: 00:31:58 executing program 2: 00:31:58 executing program 1: 00:31:58 executing program 3: 00:31:58 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, 0x0) 00:31:58 executing program 0: 00:31:58 executing program 4: 00:31:58 executing program 2: 00:31:58 executing program 1: 00:31:58 executing program 3: 00:31:58 executing program 5: 00:31:58 executing program 0: 00:31:58 executing program 2: 00:31:58 executing program 4: 00:31:58 executing program 1: 00:31:58 executing program 3: 00:31:58 executing program 5: 00:31:58 executing program 0: 00:31:58 executing program 4: 00:31:58 executing program 2: 00:31:59 executing program 3: mlockall(0x1) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x8) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) sendfile(r3, r2, 0x0, 0xedc4) 00:31:59 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x2, r2, &(0x7f00000000c0)) 00:31:59 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x3, r2, &(0x7f00000000c0)) 00:32:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020b0001020000000000400000004008"], 0x10}}, 0x0) getcwd(&(0x7f00000000c0)=""/62, 0x3e) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000282, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xdb) 00:32:00 executing program 0: socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r0, 0x0) r1 = getuid() r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000002600)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000002700)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@ipv6_delroute={0x0, 0x19, 0x100, 0x70bd29, 0x25dfdbff, {0xa, 0xa4, 0x20, 0x1, 0xfd, 0x0, 0x84770f8cf8471067, 0x3, 0x900}, [@RTA_UID={0x0, 0x19, r1}, @RTA_ENCAP_TYPE={0x0, 0x15, 0xc}, @RTA_OIF={0x0, 0x4, r3}]}, 0x44}}, 0x0) 00:32:00 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x410180, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x10200000008) 00:32:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="73686fba77657865632c009f31c4821176e5c8b7b81ab36c4624a8a9f58b7b9795d3875859ac3e3bd78457f1ce513856f19e224dc8a88ed2010000000000000041e5a1dc360c4e6599a93cb4e17d340508ffeea34be76b1c109c7d3d2c0fe61237fff5fa937f410010ecc04faf00000000000000210000000000000000c2ac45"]) chdir(&(0x7f0000000080)='./file0\x00') r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$P9_RWALK(r0, &(0x7f00000000c0)={0x3d, 0x6f, 0x2, {0x4, [{0x3, 0x0, 0x8}, {0x9, 0x4, 0x2}, {0x1, 0x4, 0x2}, {0x10, 0x2, 0x7}]}}, 0x3d) 00:32:00 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x4, r2, &(0x7f00000000c0)) 00:32:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x10001) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:32:00 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x5, r2, &(0x7f00000000c0)) [ 234.091325] FAT-fs (loop4): Unrecognized mount option "shoºwexec" or missing value 00:32:00 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 00:32:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0xb) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) 00:32:00 executing program 4: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000100)={0x2, 0x0, 0x80000001, 0x9, 'syz0\x00', 0x4}) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.u'}, 0x15) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@access_client='access=client'}]}}) 00:32:00 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x6, r2, &(0x7f00000000c0)) 00:32:00 executing program 3: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502cffebb8a0729ef53fb36b4f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb08000000ba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3f41705b96a6711d4679079d0000000000000000170000"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) socket$can_raw(0x1d, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 234.359229] audit: type=1400 audit(1569889920.827:45): avc: denied { map } for pid=8898 comm="syz-executor.1" path="/root/syzkaller-testdir754485560/syzkaller.rkcVM3/39/file0/mem" dev="devtmpfs" ino=1046 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file permissive=1 00:32:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020b0001020000000000400000004008"], 0x10}}, 0x0) getcwd(&(0x7f00000000c0)=""/62, 0x3e) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000282, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xdb) 00:32:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020b0001020000000000400000004008"], 0x10}}, 0x0) getcwd(&(0x7f00000000c0)=""/62, 0x3e) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000282, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xdb) 00:32:00 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x1000000}) 00:32:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x159, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x200, 0xd77, 0x8, 0x4, 0x1, [{0x523, 0x0, 0x3}]}) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) fcntl$notify(r2, 0x402, 0x80000024) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SVE_SET_VL(0x32, 0x1a545) socket$inet6_tcp(0xa, 0x1, 0x0) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) 00:32:01 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x100000000000000}) 00:32:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x100000000}, &(0x7f0000000100), &(0x7f00000001c0)={r0, r1+30000000}, 0x8) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r2, 0x0) fstat(0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000040)={0x0, r4}) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x0, @remote, 'lo\x00'}}, 0x1e) 00:32:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@attr2='attr2'}]}) socket$can_raw(0x1d, 0x3, 0x1) 00:32:01 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) kcmp$KCMP_EPOLL_TFD(r4, r0, 0x7, r2, &(0x7f00000000c0)={r3}) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) [ 234.745666] ptrace attach of "/root/syz-executor.1"[8061] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ    w\x0d    #  Y  @ = 00:32:01 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() socket$nl_xfrm(0x10, 0x3, 0x6) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r3 = getpid() tkill(r3, 0x9) kcmp$KCMP_EPOLL_TFD(r3, r0, 0x7, r2, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x400004}) 00:32:01 executing program 4: syz_mount_image$vfat(&(0x7f0000002040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe002, 0x1, &(0x7f0000000140)=[{&(0x7f0000002000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000020c0)={@remote}, &(0x7f0000002100)=0xc) socket$inet6(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002a40)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)="ab7c48438dd89fd33765d4a201ef23", 0xf}, {0x0}, {&(0x7f00000008c0)="132fee384d14299a3fe1329e91c2bd0f5c97cd15f4cce14cde642ee2965c89e8d6211778dbe47d5f70b10aaae202218797f504c4", 0x34}, {&(0x7f00000009c0)}, {0x0}], 0x5}}, {{&(0x7f0000002780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2}}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002800)="3edcd1c74cd254642726dcbf526c38a96c0bb3d3893879017a2711a369516dd0652711d3fbe5", 0x26}, {0x0}], 0x2, &(0x7f00000029c0)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14}}, @mark={{0x14}}], 0x48}}], 0x2, 0x11) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000000)={0x0, 0x8b3615df3cae85b1, 0x1ff}) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) sendmsg$key(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)={0x2, 0x9, 0x1, 0x0, 0x3b, 0x0, 0x70bd2a, 0x25dfdbfd, [@sadb_x_filter={0x5, 0x1a, @in=@remote, @in6=@loopback, 0x2, 0x2}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d3}, @sadb_x_filter={0x5, 0x1a, @in=@loopback, @in6=@empty, 0x3, 0x4, 0x14}, @sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@loopback, 0x8, 0x30, 0x4}, @sadb_key={0x21, 0x0, 0x7c8, 0x0, "066df8c4bc143bb097fa1a4f66706d40af884b348de7c2c3d2a57b671c986ee8e6503585f82352e55cb6af2d2ec38f2a1224cf0bdfc98375df786951b6e42a1254caa6bcff06c252e02e5d4ed72407f42cfb32e666ee8f8d89600a9890bcedea5c4a32a8b7bc8a5804a600210259e1ff9be0839d2dcbbd679b4375a44804b078cd46afe7312dbe404c080962464902096c3106f85b5fb82aeea7d73ef3566c410d2b7a318c75bc6c86129b1f7ff2502f523c1b516876b4e42b3746cea89ca3660a992c8f8cf89c5c78042a7dd49eff905db7329e46257c3af63e7a00b21362eb77594f6d581a07f1f4b96d3e79d1fdd2852613079547a88007"}, @sadb_x_sa2={0x2, 0x13, 0x4c, 0x0, 0x0, 0x70bd29}, @sadb_x_sec_ctx={0x5, 0x18, 0x0, 0x1, 0x1b, "98e2073d1f905f1c692cefa58caa5fec4e9ae7caf5028de31e9063"}]}, 0x1d8}}, 0x8040) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) fgetxattr(r4, &(0x7f0000000240)=@known='trusted.overlay.impure\x00', &(0x7f0000000300)=""/101, 0x65) sendfile(r1, r3, 0x0, 0x7fffffa7) syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_trie\x00') [ 234.969447] ptrace attach of "/root/syz-executor.1"[8061] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ    w\x0d    #  Y  @ = 00:32:01 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r3, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8600, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r5, 0x0) fstat(r3, &(0x7f0000000200)) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) [ 235.116855] XFS (loop5): Invalid superblock magic number 00:32:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x159, &(0x7f0000000400)="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"}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x200, 0xd77, 0x8, 0x4, 0x1, [{0x523, 0x0, 0x3}]}) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) fcntl$notify(r2, 0x402, 0x80000024) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) prctl$PR_SVE_SET_VL(0x32, 0x1a545) socket$inet6_tcp(0xa, 0x1, 0x0) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) 00:32:01 executing program 3: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502cffebb8a0729ef53fb36b4f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb08000000ba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3f41705b96a6711d4679079d0000000000000000170000"], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) socket$can_raw(0x1d, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 00:32:01 executing program 2: r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:32:01 executing program 5: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x15, 0x4, 0x9e, "63754e44b1a67a16c6f89180a4209de5"}, 0x15, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x32, &(0x7f0000000100)={&(0x7f00000004c0)={0x14, 0x22, 0x829, 0x0, 0x0, {0x4, 0x1000000}}, 0x14}, 0x1, 0xfdffffff00000000}, 0x0) fremovexattr(0xffffffffffffffff, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 235.302741] audit: type=1800 audit(1569889921.767:46): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16620 res=0 [ 235.346403] ptrace attach of "/root/syz-executor.1"[8061] was attempted by " °ÿ àÿ 0 p €  ÿ Àÿ ðÿ ÿÿÿÿ    w\x0d    #  Y  @ = [ 235.404921] audit: type=1804 audit(1569889921.767:47): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir535929791/syzkaller.4ib7P3/34/file0" dev="sda1" ino=16620 res=1 [ 235.478094] audit: type=1800 audit(1569889921.787:48): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16620 res=0 [ 235.503340] audit: type=1804 audit(1569889921.797:49): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir535929791/syzkaller.4ib7P3/34/file0" dev="sda1" ino=16620 res=1 00:32:02 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000100)={0xee4, 0x278dc17e, 0x5, 0x0, 0x0, [], [], [], 0xfffffffc, 0x7fff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r3, &(0x7f00000000c0)) 00:32:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000007ffff000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e22, 0x5, @remote, 0x40}, @in6={0xa, 0x4e23, 0x9, @mcast2, 0x80000000}], 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e38e06c5fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b53606000000000000007c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df1001000000000694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b22645cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f580968af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb010100000000000001a047526865c888c9ff36056cc4ad258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d819164300"}) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:32:02 executing program 0: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x100000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffdffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) read$rfkill(0xffffffffffffffff, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7f) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 235.741011] audit: type=1804 audit(1569889922.207:50): pid=8987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir535929791/syzkaller.4ib7P3/34/file0" dev="sda1" ino=16620 res=1 00:32:02 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) syz_open_pts(r0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) sendmsg(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000200)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0xffffffffffffff0f, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 235.955793] kvm: vcpu 0: requested 128 ns lapic timer period limited to 200000 ns 00:32:02 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/dev/dsp#\x00'}, 0x10) tkill(r0, 0x9) r1 = gettid() r2 = syz_open_dev$vbi(&(0x7f0000001600)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000001640)={{0x29, @local, 0x4e24, 0x4, 'sh\x00', 0x20, 0x7, 0x31}, {@loopback, 0x4e23, 0x4, 0x0, 0x7}}, 0x44) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="e0000000", @ANYRES16=0x0, @ANYBLOB="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"], 0xe0}, 0x1, 0x0, 0x0, 0x50040}, 0x4000000) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r4, &(0x7f00000000c0)) 00:32:02 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000240)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r3, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x57, 0x1, 0x0, 0xf1, 0x0, 0x9, 0x1000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000180), 0xa}, 0x4, 0x5, 0x6, 0xe53841f11216db37, 0xffffffff, 0x8, 0x81}, r1, 0xd, 0xffffffffffffffff, 0x4) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r4, 0x8, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0xb2e872fff93eb4e0}, 0x44008) [ 236.259598] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 236.291007] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 00:32:02 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r2, 0xc10c5541, &(0x7f0000000100)={0xee4, 0x278dc17e, 0x5, 0x0, 0x0, [], [], [], 0xfffffffc, 0x7fff}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r3, &(0x7f00000000c0)) [ 236.325625] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 00:32:02 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@known='tru\r_5\x91Hsted.o\xde\xee\xba%\xbfC\xcc\xb4edi\x1d\xc7\x80\xed\x93NN\t\xc0\x84\x1f)\xda\xc4_\xe7.?\xeb\x16\x8cG\xd2\xa4S\xfc\x8f\xfbv&4&\xc7,\xb4\x91AF\xb6)9\xee\xdcD\xd3*\x83WF\xe2\xb6\xd6\x01\xb0\xf6s\xd7,P\x9d\xb2>\x00\xed\xb1\xd6\x9e\x8e\xc5+uxrQ`\x1d\x88\x02\xcfERH\xa2\xff\x80[\xf7\xfd\x10\xf1\xc2\x13\xffa\x93\xda\x12d\x86\xa6\x95\xe5\xe73\xa9R\xa7') [ 236.447268] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 00:32:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8f7cab9733b79809a0a37dca83d912465c7db45c8bffa430a90ad9c58345ead54339995616f4c69454231bc2c82513b9035443a67ce25498509eb96787c4131bbe4992b7454c98986f39c0c08e498a82cef9a937a1b29326862c2f065d2dd139beed1ae33356755e232e5945533abf3fb500"/125], 0x200600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x12}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffbb) lsetxattr$trusted_overlay_upper(0x0, &(0x7f0000000100)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r5, 0x0, 0x91ffffff, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(r5, 0x0, r4, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffffbd) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sendto$packet(r5, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) [ 236.562725] audit: type=1400 audit(1569889923.027:51): avc: denied { map } for pid=9052 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 236.680422] audit: type=1400 audit(1569889923.147:52): avc: denied { map } for pid=9054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 236.853300] audit: type=1400 audit(1569889923.147:53): avc: denied { map } for pid=9054 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 237.010764] audit: type=1400 audit(1569889923.167:54): avc: denied { map } for pid=9054 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:03 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) r3 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x10001) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x313000, 0x0) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x10001) r6 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x10001) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) 00:32:03 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$P9_RWALK(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x12) write$P9_RREADDIR(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="ea"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000040)={0x2}) 00:32:03 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009040)=[{{0x0, 0x0, &(0x7f0000004580)=[{&(0x7f0000004480)=""/245, 0xf5}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) link(0x0, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x7f\xef\x00\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty, 0x4}, 0x1c) listen(r2, 0x80) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000000)={0x4, 0x0, 0x10000, 0xf6}) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x6, @remote}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200000) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') write(r3, &(0x7f0000000380), 0xfffffffe) 00:32:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x0, 0xe15600000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffa0008000, 0x247, 0x0, &(0x7f0000000200)="fbbe22cf104c948f665e6007769d", 0x0, 0x2b1, 0x0, 0x0, 0x114, &(0x7f0000000380)="4fe3c2f43736632c8d3654a27fa7495c7691eec11c622561cd77b0cd3ac5730bcb8f2b1e5625c646db0e747fa68699b949890c76c8114c5f8f4604d52413eab13944d67be98780f18eddd0451f57e9b1f452f53231ff764f6ec51c64bdd33580daddd7bd3694bb1f17e4b99a57852397", 0x0}, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x10081, 0x0, 0x0, 0x0, @time={0x0, 0x1c9c380}}], 0x2c) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0xca200, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000280)={0x0, 0x5, 0x6, @remote, 'team_slave_0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000140)={0x0, 0x37a, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x2d8}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736671002c00020028000100000000000000000000000000000000000000000000000000000097000000000000000000"], 0x58}}, 0x0) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x9, {0x4, 0x98, 0x1, 0x6}, {0x5cc9, 0xff, 0x101, 0x2c}, {0x5c4a, 0x7}}) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:32:03 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x8804) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) ioprio_get$pid(0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = dup3(r3, r5, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r7, &(0x7f0000000340), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r7, &(0x7f0000000300), &(0x7f0000000040)=""/59}, 0x18) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000001680)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000016c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, &(0x7f0000001700)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r9, 0xffffffff}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r9, 0x40}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0xf32c, 0x7, 0x200, 0x7, 0x6a2, 0x7, 0xfffffff9, 0xffff, r10}, &(0x7f0000000280)=0x20) socket$alg(0x26, 0x5, 0x0) r11 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r11, 0x0, 0x0) syz_emit_ethernet(0xc1, &(0x7f0000000000)={@local, @empty=[0xf5ffffff00000000], [], {@ipv4={0x800, {{0x19, 0x4, 0x3, 0x2a, 0xb3, 0x68, 0x7, 0x4, 0x0, 0x0, @rand_addr=0x7f, @multicast1, {[@lsrr={0x83, 0x13, 0x83, [@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @broadcast]}, @generic={0x88, 0x6, "4c7bc2a3"}, @end, @rr={0x7, 0x1f, 0x0, [@empty, @local, @initdev={0xac, 0x1e, 0x5, 0x0}, @loopback, @loopback, @remote, @multicast1]}, @ssrr={0x89, 0x17, 0x0, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x25}, @dev={0xac, 0x14, 0x14, 0x17}]}]}}, @udp={0x4e22, 0x4e20, 0x4f, 0x0, [@guehdr={0x1, 0x0, 0x2, 0xf5, 0x100}], "d2b35c49b1146fbd5beee9858c29cf72df5c462030a56f9ccf10beb8f2f2f9f4c691ce57484cad79bc4af52eb449ee0b0b9cb1f7b2d068776ef5d8b9e30d2184612919"}}}}}, 0x0) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x18000, 0x0) ioctl$UFFDIO_ZEROPAGE(r12, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) 00:32:04 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r2, 0x0, 0x1ba, 0x100100002) listxattr(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)=""/46, 0x2e) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r4, 0x100, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) 00:32:04 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="3caeb5e8c7b9837c0f3c46aac793ac8ef4fd1dd593bab545eaa917e7eef4fb97d25df645f10ae568e3b686905718691969b338556b7d43ae9cbd66e66ade0b7d2f20c821190f90c6d9f29d0c857ed1b464033dc46aa11b3c6377ba514cdc523d42d10de20435cc4c35dd166ac2e506a7d75312c923c02fa6be7982281777ba2c45be8718d3d58fabffe0cb42e535776c978606e45410e171e6bc0bafb7d18efb88870fb483095ffa70f7a0cbd87fbb0149b8960d0b8653d2b8d2572e8ff175078e0fc23baf3272929456dedbd7f1397c"], 0x2) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000780)}]) 00:32:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffe35, 0x0, 0x0, 0x0, 0x2, 0x0, 0x365c, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000080000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa0a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000010c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000400)=0x2) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xffffffffffffffff, 0xa}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000001000)=""/142) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f00000000c0)={0x0, {r2, r3+10000000}, 0x7f, 0x5}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1fe, 0xf0d8, 0x80000000, 0x80000000000000, 0xa5}, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') getdents64(r5, &(0x7f00000003c0)=""/4096, 0x1000) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000140)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) getpid() gettid() r6 = getpgrp(0xffffffffffffffff) setpriority(0x0, r6, 0xffff) r7 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000280)) r8 = open(&(0x7f00000013c0)='./file1\x00', 0x143000, 0x112) ioctl$TCSBRKP(r8, 0x5425, 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) pipe2(&(0x7f0000000180), 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x10000000000000, @mcast2}, 0x2e7) 00:32:04 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) prctl$PR_GET_TIMERSLACK(0x1e) r3 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e7", 0x10, 0xfffffffffffffffe) r4 = add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r3}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00\x8d\xff\xff\xff\x00'}}) keyctl$invalidate(0x15, r3) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:32:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x8, &(0x7f00000000c0)="11dca50d5e0bcfe47bf0707f6a0bd72cb61021b1570460aec5dc6eb6440db043a95ad16cb612155a9cbe9b82fee44cc0711c179a4e7c375f0ba5face62019ae889183902000000c8fd1e6e460fa0702eb180631ef706506e6c9d0ae3fec3639c50a86695648ee8a0947f4a2ca433a9dc917f96f7dcbd018a1e5539c6eb5865a52d66f6836dc177c285526e50264f83ff63304fd6912ab306c843ec901a9be5d541082676151b84") socket$inet(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r1, 0x0) accept$alg(r1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="c89e7323f1d7b39cedb177f5b890ce3b324d2ee284178e4447b671ad35b2b5af7211f66af6eb93ac26de289154420fbdfffba5d5c0b068fb6f588d2299d33c0f888ede6c7e4e3ed6121836e51763caeb6f8aced3c1bb495fd38ba2a0df41eb13a7072c675cd7779e", 0x68}, {&(0x7f0000000180)="de4db976e1ddd1ea1fac6def03cce4e0737cde270ab6faa7396872bff1937fe037d2b1356b641ff0ffe4bba24e1e7b825d08beb8aec7dd022c3cdf0aac7eec5ad0c301e7", 0x44}, {&(0x7f0000000200)="1db674e9f723df0f84fa12815569593e259024072c47571d09eddb7fd6eabfe4632b8ad96d0a85858f18b78cae8f2447a0b59c819a4aec86fd2631744468a42344bd22b450654c602e0b5deb4d069d2b9af5", 0x52}, {&(0x7f0000000300)="03576c5618b3dd42d420ffcb6054dcbf1cdf58dad458d5135a46c20fd9d87747ca9803950a45c9e009cdd4a88a962d57dfb20ba758eef853dbd94e995b040684a02ec32d4e98a0b97a09e1c7ee77a53731a41dcc43d537ad82feb3d8702fb98c5462ede66a71a9bc6f0d1115c26fa5c8d33260d1ee6a7f2f89869aa2f3", 0x7d}, {&(0x7f0000000380)="89040a967a2d5905f10e26205ee35a4ddd08a9ae44c9ddabb4d66ff61cb6f4dd53a622dc3022e52d6ff3d48d46d596b176639101b56d829c6aae829fdd28910092715c47e306b77c23cb5ad90e1a3c408a10237ed1eaf9ed1df9605592dd0b3c8c028cd6fd855496928ee7aa3d0645e830ae7b6e9dbab0be700dd7cc204fa14a47420a61b82ab32413f2f59040221973007119e4199e054b92fb6f83cac4852c95ad0a0be09d9bc2a375", 0xaa}], 0x5}, 0xcf294259c8e2a94) 00:32:05 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000000), 0x0) getresuid(0x0, 0x0, 0x0) stat(&(0x7f0000002200)='./bus\x00', &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000002300)='security.capability\x00', &(0x7f00000022c0)=@v3={0x3000000, [{0x400, 0x4}, {0xe26, 0x3}], r0}, 0x18, 0x0) r1 = socket$inet6(0xa, 0x5, 0x1) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = msgget(0x0, 0x2) msgctl$IPC_INFO(r3, 0x3, &(0x7f0000000000)=""/74) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) r6 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x10001) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r7, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f00000021c0)={0x0, 0x2}, &(0x7f00000024c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000002500)={r8, 0xffffffff, 0x10}, 0xc) ioctl$KVM_GET_NESTED_STATE(r5, 0xc080aebe, &(0x7f0000000140)={0x0, 0x0, 0x2080}) getrandom(&(0x7f0000002340)=""/185, 0xb9, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000002400)={{0x4, 0x6, 0x9, 0xc0, 0x81, 0xff}, 0xdad, 0x0, 0x1, 0x3ff, 0x3ff, "3448de89650938b8628370112d364f324f877f550c3e03dccbf46ad69aa5faa6da556d4aedb9c2e13831f9e9c0120cb00579e76149165a28836150912a873aab2b5a6f6451b9bca735085e68379b38a7a26e2c635f5a6df5636ad253a66e39c36ec3f7c454257752ae6b96cb0774aaf67a361c1e0fe81ad9e9d8298beeadb045"}) ftruncate(r4, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2}, 0x8) sendfile(r1, r4, 0x0, 0x80001d00c0d0) [ 239.400561] kauditd_printk_skb: 120 callbacks suppressed [ 239.400596] audit: type=1400 audit(1569889925.867:175): avc: denied { map } for pid=9118 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:06 executing program 1: r0 = dup(0xffffffffffffffff) syz_open_pts(r0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000000)) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) r2 = timerfd_create(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup(r3) r5 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="dcce1a7c1da1db27fc695f6791f39a", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',\v']) [ 239.649371] audit: type=1400 audit(1569889925.907:176): avc: denied { map } for pid=9115 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1}, 0x3f00) clock_settime(0x5, &(0x7f0000000040)) [ 239.838413] audit: type=1400 audit(1569889925.907:177): avc: denied { map } for pid=9118 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 240.017945] could not allocate digest TFM handle streebog256 [ 240.017991] could not allocate digest TFM handle streebog256 [ 240.058992] audit: type=1400 audit(1569889925.907:178): avc: denied { map } for pid=9115 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:06 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() tkill(r1, 0x9) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r3, &(0x7f00000000c0)) 00:32:06 executing program 0: r0 = socket(0xa, 0x801, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@ipv4={[], [], @remote}, @empty, @local, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x820400ff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{}, "9a7b435d864282c7", "9234cc1abd949fa4eb57559c818df186106f0a8009481bfeb420bae60f252401", "0497c74d", "a26c3512c94e767d"}, 0x38) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, 0x0, &(0x7f0000000240)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000002c0)=0x2) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'veth1_to_team\x00', 0x410}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) socketpair(0x14, 0x80000, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x10001) r7 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x10001) mq_getsetattr(r7, &(0x7f0000000200)={0x1, 0x400, 0x0, 0x9, 0x2, 0x6543, 0x101, 0x7}, &(0x7f0000000300)) dup2(r5, r6) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x750, {0x2, 0x4e20, @dev}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x10e, 0x4000000000, 0x80000000000, 0xfffffffffffffffe}) rmdir(&(0x7f0000000000)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) unshare(0x60000000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1209, 0xfffffffffffffffe}) r8 = syz_open_dev$evdev(&(0x7f000000dfee)='/dev/input/event#\x00', 0x0, 0x0) ioctl(r8, 0x80004520, 0x0) [ 240.263320] audit: type=1400 audit(1569889925.927:179): avc: denied { map } for pid=9111 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 240.409924] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.413214] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.427287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.433166] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 240.481792] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.696526] IPVS: ftp: loaded support on port[0] = 21 00:32:08 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) syz_open_pts(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = getpid() tkill(r1, 0x9) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r3, &(0x7f00000000c0)={r0}) 00:32:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffd2) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000180)) r3 = getpid() tkill(r3, 0x9) syz_open_procfs(r3, &(0x7f00000001c0)='net\x00') ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x0, 0x2}) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x44) 00:32:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x4003fd) write$binfmt_elf64(r2, &(0x7f00000003c0)=ANY=[], 0x679e) fallocate(r2, 0x0, 0x8004, 0x7fff) fallocate(r2, 0x43, 0x9, 0x1000000000) fallocate(0xffffffffffffffff, 0x3, 0x5e89, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/93) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x21, 0xee28, 0x800) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, 0x0, &(0x7f0000000380)) r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) rseq(&(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1, 0xfffffffeffffffff, 0x1, 0x91}, 0x4}, 0x20, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x679e) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000200)={0x1, 0x0, [0x0]}) [ 242.400305] IPVS: ftp: loaded support on port[0] = 21 00:32:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000180)={0x8, 0xa7b, 0x80000000, 0x6, 0x8001}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1000, 0x600000) getsockopt$netlink(r2, 0x10e, 0x7, &(0x7f0000000040)=""/200, &(0x7f0000000140)=0xc8) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) 00:32:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10920, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f00000003c0)={0x3, 0x0, 0x40, 0x6, '\x00', 0x4}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) listxattr(0x0, &(0x7f00000004c0)=""/71, 0x47) sendfile(r0, r1, 0x0, 0x80003) rename(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r5, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff0001}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x40000) dup3(0xffffffffffffffff, r3, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000180)={0xffffffff, {{0x2, 0x4e22, @loopback}}}, 0x88) 00:32:09 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r4, 0xc04c5349, &(0x7f0000000140)={0xff, 0x8, 0x7a54}) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r5, 0x68f639dd53bda0d) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000000)={0x0, 0xff08, 0x3}, 0x8) r6 = getpid() tkill(r6, 0x9) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r3, &(0x7f0000000100)) 00:32:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000240)={0x7, 0x5, 0xfffffff7, 0x0, 0x0, [], [], [], 0x400, 0x3}) r2 = fcntl$getown(r0, 0x9) tkill(r2, 0x1d) r3 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r3, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6050a09c00081100fe8000000000000000000000000000bbfe80000000000000aa0000000000569078"], 0x0) syz_open_procfs(0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000600)={'team_slave_0\x00'}) mkdirat(r4, &(0x7f0000000740)='./bus\x00', 0x0) write$FUSE_INIT(r4, &(0x7f0000000140)={0x50, 0x0, 0x0, {0x7, 0x1f, 0xfffffffffffffffd, 0x80, 0x2, 0x0, 0x0, 0x628}}, 0x50) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff}, 0x80000) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f00000004c0)="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") rmdir(&(0x7f0000000200)='./file0\x00') 00:32:09 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) io_setup(0x0, &(0x7f0000000380)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x16c}]) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) r5 = syz_open_dev$usb(&(0x7f0000000500)='/dev/bus/usb/00#/00#\x00', 0x4, 0x50400) r6 = dup(0xffffffffffffffff) syz_open_pts(r6, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x4e}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/btrfs-control\x00', 0x100, 0x0) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) io_submit(r1, 0x6, &(0x7f00000007c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000280)="cf5621db678361d4c8af73f0cb146db664061281eea38024703a58463bc73591b559c03ade46745d74f397bf97eb127ba66a6d0c835ce90dfdcd990401702fd3c0bf16f98ab04385e38fa8430e7802a5f1bf54c17d1be293230ada9df3aebb0c8699f7c37d0b1aa175b0fb688d6ee6bcdb3c060fc7436e148cd9cc8a463f03e7b22a87dba1d009f5fa23609a5c323c4a28d69fba7e7eebf97b73f20b0222d26bfa86b1859ea203207ed376b90130e681fa6ce63a", 0xb4, 0x10000, 0x0, 0x4, r2}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0xe1c1, r3, &(0x7f0000000380)="720baa20cffc1289d2ebc1e125f6bc7c8b4edebc4dc6cef2d83c9d20519089f603f9adae31bf869cb23e1ccdad6a71dfdf9bf2adffb4d5532ebb17f277b2237d1a69a8cbb87ff25ad0a529277f1c3f2472c6f980a87fd3872c3e49d322004bfdc50dfdc1754dd02e1c7aeeebd6f320ec4fbeaa3552c91edea1d7248790d43d2bf43034d68cb4717478d06dbf2c879a3f3dfba17aa246ab60b7cfac581fc5d2e35d9fc05e004160db3abe42e7002b1fec5092055d70b9d2df0cc74f3f8145543907602b19ca754026fb3b7859442cc23d4ad6b13f0bb8439abfc349683a4d09af5836d3ac96caedd4", 0xe8, 0x5}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xe3058ccdca3248ba, 0xffff, r4, &(0x7f00000004c0)="1391ae2adc4effa7", 0x8, 0x1, 0x0, 0x2, r5}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0xdb8, r6, &(0x7f0000000580)="8ae3691bef6284fc137915661b448ea76251099ef40cfa3451", 0x19, 0x7ff, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r7, &(0x7f0000000600)="a003b762717035b616bea01eb094eff471f0bfafaea68a52ec3edd6a553fe96593228359801de2cea06d34313b8c9605d4a675", 0x33, 0x6, 0x0, 0x1, r8}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x2, r0, &(0x7f00000006c0)="6b1471d379c60c7a92a408f8b327242fff12068f7109b721a18eff9086a76ef68a83f762e6dccb25d24d4c4d9c7e3e8aa4623e8839e7ecd7bdf036db34672d4fb2d1a1b22cf4100bda86ac3550babe21ed0ad3f2837f0b501a773da825a03cc82c695d208a08eeff8a178467a6eb936e03315c33beb57b", 0x77, 0x80000000, 0x0, 0x0, r9}]) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000240)=0xffffffff, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r10 = dup(0xffffffffffffffff) r11 = socket$inet6_sctp(0xa, 0x0, 0x84) syz_open_pts(r10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'bcsf0\x00', 0x1}) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r12, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$sock_TIOCINQ(r13, 0x541b, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r10, 0x84, 0x1b, &(0x7f00000012c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000000)=0x1008) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x8d01, 0x8000, 0x2, 0x4, r14}, &(0x7f0000000080)=0x10) 00:32:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa0d1, 0x1}, 0x5e4eb, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x102b00, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x21, 0x3, 0x9, 0x7, 0x0, 0x8, 0xa0884, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xce, 0x0, @perf_bp={&(0x7f0000000040)}, 0x1201, 0xc8b0, 0x5, 0x2, 0x7fff, 0x9, 0x28}, r1, 0x10, r2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 00:32:09 executing program 4: r0 = dup(0xffffffffffffffff) syz_open_pts(r0, 0x0) r1 = socket(0x1e, 0x4, 0x0) fremovexattr(r1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x3, 0x70bd2d, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4030}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x20, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x188}, 0x20000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$xfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="7c29d45c5c5cc318c4becb24a04c32254bbc93b5ac8e1da16782733db1ad79d8fbbea2c8e2631c14a0602c95a0be134127c45398bb9790b0ee61a20e8185702286719a0d1d176bf479203bea9fad61afd7defe831087ddb1c8c8a108968f8d4c0c", 0x61}], 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r7 = dup3(r5, r6, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x2000000000000000) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10001f}) r9 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$VIDIOC_RESERVED(r7, 0x5601, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0xaaaaaaaaaaaae88, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="b9000400000f3266ba430066eddc0f0f01c442c20100b9050400000f32430f01c2c482198e5200c4e16d75572ab9800000c00f3235001000000f30", 0x3b}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0, 0x289}], 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x80) ioctl$KVM_RUN(r9, 0xae80, 0x0) [ 243.455696] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 243.474995] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 00:32:10 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r3 = dup2(r2, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r3, &(0x7f0000000280)={0x7}, 0x269) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0xecd8dbfe7504e052}) r7 = gettid() r8 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r7, r0, 0x7, r8, &(0x7f00000000c0)) 00:32:10 executing program 5: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000000c0)={&(0x7f00002df000/0x3000)=nil, 0x3000}) r0 = dup(0xffffffffffffffff) syz_open_pts(r0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000140)={0x7, 0x9}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) close(0xffffffffffffffff) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) sendmsg$alg(0xffffffffffffffff, 0x0, 0x8000) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00>\xa9\xf6\xb9;i\xefXB\xe6j\x7f\x16\xc6\xe0]G\xb0\xd0\xdf\x96\x00\xbbs\x16\xa8\xc0N\x1f\x01\x11\xc2\x84\x88a\xbd\x8f~\t\xa6\x15\x8e\x87\r])x>\x9e\xb8@\x9b\x9dw\xc6O*\x87\x81\xb0\xe0\v)]\xbf\xdeV\xbds-\x16m0\x1fie\xfc\xbf\xbehQ\xb4w\xe5\xc0\x15\xde\xd5\xc6n\xd5Y\xf1\xff\xfc\xecc\x16\x91\x11\xd6\f\xbeP\xd6\x81(\xe5\x95\xb24\xad\xc8\xce\x96\xd4\x9d\xa34\'DvpR\xf5\xbeL\x98\xdaD\x88\xbdg6C\xe04k\xfey\x10\x1a\xa0~\xf2?G7\x8b\xa7\xb48\xd6\xb6\x01\xdc\x90\x06:\xd4C\x84\xab\xa9RPldg>\xff\xea.\xccnz\xea#\xf6\xd0\xe6\x8a\xa4\xf2\xfaf\x1dp\x8e}B\xa5\x1c\xc5\xdbJ\xca\xd5\t\xf6\x99\xe7\xfe0\x92\x87p]\x7f\x8aj\xbf\x01\xe3w\xcf\x9d<\xd5\x1d\xb4\x01\x80\xf5\x1d\xf3_\x83,50S\xb1t\x98\xed\xaa\x93\x85sx\\#\x16\xbd\x8f\"F\x8d\xcfZ\x1b\x99\f\x86I\xc9t\xa8x@\xf4b\xcdm5\x06s/gA.\x1ciuU\\U4\x13k\x0e\x03\xc8') mmap$xdp(&(0x7f00003e5000/0x4000)=nil, 0x4000, 0x2, 0x6053, r0, 0x80000000) dup3(0xffffffffffffffff, r3, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="00000000000000000000008a638ced9816d9477b819ed0b6be0dc93ecdf1a0d44508137454a8d69881bb037e6cb7ca259532f4df0b51b66faeaea8b1b4f500d4e97c514ca8850319f0767bbfc360c831e88c330508a70e038ae8aa041f29965cab435d347f30739d4c4b56f9792b8ac2794b7acd15919bc765985d28165794492082dfabbf64f4345da0141445bfd863f9e223f6a89ca27e4d9982b70a1cbf2dfe5fddcd63dabce00de669310f676a86ffc4bbe27e10ea170714d53f1a") 00:32:10 executing program 1: sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) lstat(0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getresuid(0x0, &(0x7f00000002c0), &(0x7f0000000300)) sched_setscheduler(0x0, 0x5, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/softnet_stat\x00\x7f\xe7\xbbh\xbeC\xfb\xe3\xa0\x96\x9f#\x1eE\x0f\xa7\x9f\xe2R\x8b}UL\xc1:\x10N\xafJ2\xb0\xfd\xd5$.\x97\xe0\x1bG \xdb\x96\xd0\x18\x15\xb34\xc65e&g\xd3\b\x00~\xe7%7\x9cxu\x7f\x8a\xa2\xd0O\v\x97\x8a[\xe0$\xaaF\xab\xaf\x13n\x8d\x04j\xd6\x9e\xc4\xea\xbd\xe4#\xd7\xcb=\xf3\x1a\xae+\xe3kX\xa6\x80)\xc2\x81L\xd9H3\x13F8\xbe\xb2T-\xa8\xbb\a|\xfd\x97\xcd\x9d\xd8b\x06\xfan\xa9\xfd%\xc9V\xe7j\xbe\x1f`\xb0\x1f\xcfq2\x8c\xc3_\xab\xb3\v\x0eo\xbe{\xcf-4\xd22\xc0\xc3\xdf\xde$_\xb74|') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) [ 244.127370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 244.407553] kauditd_printk_skb: 260 callbacks suppressed [ 244.407568] audit: type=1400 audit(1569889930.877:412): avc: denied { map } for pid=9238 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 244.601895] audit: type=1400 audit(1569889930.877:413): avc: denied { map } for pid=9241 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:11 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000540)={'nr0\x00', 0x8}) r2 = gettid() r3 = geteuid() mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x629007767e03e596}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, 'gid_map\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000100)={0x2, {{0xa, 0x4e20, 0x401, @loopback, 0x8}}, 0x2, 0x4, [{{0xa, 0x4e20, 0x3, @ipv4={[], [], @broadcast}, 0xfffeffff}}, {{0xa, 0x4e22, 0x540, @mcast1, 0x2}}, {{0xa, 0x4e20, 0x6, @rand_addr="66b5349331f0deb6a3d0e06aae727e80", 0x80}}, {{0xa, 0x4e23, 0xf29, @loopback, 0x10000}}]}, 0x290) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r4, &(0x7f00000000c0)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r6, 0x0) setsockopt$packet_buf(r6, 0x107, 0xc, &(0x7f0000000580)="3a94ca1300f0f50f7de0323cfbd1e1bdfa623323836ac5c306de8d857677d2558a68e4093bfa2382f3a0dd2355fbda411c4b9d5d57", 0x35) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r7, 0x0) setsockopt$inet_udp_int(r7, 0x11, 0x1, &(0x7f0000000040)=0x2, 0x4) [ 244.805734] audit: type=1400 audit(1569889930.877:414): avc: denied { map } for pid=9241 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 244.980256] audit: type=1400 audit(1569889930.917:415): avc: denied { map } for pid=9240 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:11 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@rand_addr="b47b72bdc13578167e6ec74e312bb7aa", @rand_addr="4321745146ec439fc881f58861baa07d", @local, 0x20}) [ 245.196164] audit: type=1400 audit(1569889930.917:416): avc: denied { map } for pid=9241 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)={0x0, 0x1, 0x0, 0xfffffffc}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf32}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000180)={0x0, 0xb5e1, 0x90, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000140), 0x0, 0x0) 00:32:11 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x8, 0x40000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1) r1 = socket$inet6(0xa, 0x80000, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000340)=[@in6={0xa, 0x4e20, 0x7, @empty, 0x8}, @in6={0xa, 0x4e23, 0x10000, @remote, 0x5}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0x1, @mcast1, 0x9}, @in={0x2, 0x4e24, @rand_addr=0x6}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e23, @rand_addr=0x5}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @loopback}], 0xc4) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f00000000c0)={0xffffffffffff3ddb, 0x7fffffff}) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ppoll(&(0x7f0000000180)=[{r1}], 0x1, 0x0, 0x0, 0x0) ftruncate(r4, 0x200004) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f00000002c0)={0x5, 0x65fe, 0x1}) sendfile(r1, r4, 0x0, 0x80001d00c0d0) r6 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) sendto$inet6(r6, &(0x7f00000001c0)="137139513d85ec894084be7a143b62dc0055f4f6f3b6cca2816ba4a4b051a3ec511ef629112445e316752425e2831e22b366f4f10feab14c4964d9e3ac8ea367cd8ade2d425bb82a7ada32f96ffd75f36e378cf9397a9f257879976952c2feede5170184037acc5cbc7fe7e6bebbf68e60c04a38108b6d3cb31faa873defe9fef2c5fc059a808ff3065fc6de970655d4ed3af27aee70848541ad3c155231b8c4dc2eb59ee63177ef7a4c891b0d0176db732ad73d78b3f0be3173d47a89a35748332d5d1ede0d2062ea21d5920c6b439935c31a66230af31d2ac30f3f1aaad54f", 0xe0, 0x24040004, &(0x7f0000000140)={0xa, 0x4e22, 0x1, @empty, 0xfffff000}, 0x1c) 00:32:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r1 = syz_open_pts(r0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000180)=0x7f, 0x4) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000140)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x240) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000440)=0xd) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)) [ 245.416932] audit: type=1400 audit(1569889930.937:417): avc: denied { map } for pid=9238 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 245.605178] audit: type=1400 audit(1569889930.967:418): avc: denied { map } for pid=9240 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:12 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000440)=[{0x0, 0x0, 0xdab7}, {&(0x7f0000000740)="0be5a941", 0x4}]) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10001) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) recvmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/83, 0x53}], 0x1, &(0x7f0000000180)=""/52, 0x34}, 0x3ae9d44a90f9e9b8) r3 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000012c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/12, 0xc}], 0x1, &(0x7f00000013c0)=""/12, 0xc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x2e, 0x9, &(0x7f00000001c0)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0x6, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, @jmp={0x5, 0x0, 0x0, 0x7, 0x4, 0x58}, @alu={0x7, 0x0, 0x6, 0x3ec1a5b29eddc8db, 0x2, 0xfffffffffffffffe, 0x8}, @map_val={0x18, 0x9, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000240)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x7, [], r4, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x1, 0x6, 0x247b}, 0x10}, 0x70) r5 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x10001) accept4$packet(r5, &(0x7f00000005c0)={0x11, 0x0, 0x0}, &(0x7f0000000600)=0x14, 0x80400) r7 = dup(0xffffffffffffffff) syz_open_pts(r7, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000640)={@local, 0x0}, &(0x7f0000000680)=0x14) r9 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000012c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/12, 0xc}], 0x1, &(0x7f00000013c0)=""/12, 0xc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x2e, 0x9, &(0x7f00000001c0)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0x6, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, @jmp={0x5, 0x0, 0x0, 0x7, 0x4, 0x58}, @alu={0x7, 0x0, 0x6, 0x3ec1a5b29eddc8db, 0x2, 0xfffffffffffffffe, 0x8}, @map_val={0x18, 0x9, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000240)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x7, [], r10, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x1, 0x6, 0x247b}, 0x10}, 0x70) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, &(0x7f00000006c0)={@dev, 0x0}, &(0x7f0000000700)=0x14) r12 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r12, 0x0, 0x0, 0x10001) getsockname$packet(r12, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000027c0)=0x14) r14 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r14, 0x0) getsockopt$inet_mreqn(r14, 0x0, 0x23, &(0x7f00000028c0)={@remote, @remote, 0x0}, &(0x7f0000002900)=0xc) r16 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f00000012c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/12, 0xc}], 0x1, &(0x7f00000013c0)=""/12, 0xc}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x2e, 0x9, &(0x7f00000001c0)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0x6, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, @jmp={0x5, 0x0, 0x0, 0x7, 0x4, 0x58}, @alu={0x7, 0x0, 0x6, 0x3ec1a5b29eddc8db, 0x2, 0xfffffffffffffffe, 0x8}, @map_val={0x18, 0x9, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000240)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x41100, 0x7, [], r17, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x4, 0x1, 0x6, 0x247b}, 0x10}, 0x70) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000002f40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x50432480}, 0xc, &(0x7f0000002f00)={&(0x7f0000002940)={0x58c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x25c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x7, 0x9}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x40, 0x81, 0x40}, {0x9, 0x8, 0x5, 0x1}, {0x6, 0x20, 0x4, 0x20}, {0x8d, 0x3, 0x0, 0x6}, {0x4, 0x0, 0x3e, 0x5}, {0x0, 0x7, 0x88, 0x1}, {0x6, 0x5, 0x5, 0xc13}, {0x2, 0x5, 0x40, 0x8001}, {0x4, 0x7, 0x7, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}]}}, {{0x8, 0x1, r6}, {0x218, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xd1e}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r13}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r17}, {0xec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1, 0x3f, 0x7f}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x58c}, 0x1, 0x0, 0x0, 0x4004000}, 0x48050) [ 245.878042] audit: type=1400 audit(1569889930.967:419): avc: denied { map } for pid=9241 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 246.065279] audit: type=1400 audit(1569889930.977:420): avc: denied { map } for pid=9240 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:12 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() tkill(r1, 0x9) tkill(r1, 0x9) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r3, &(0x7f00000000c0)) [ 246.296073] audit: type=1400 audit(1569889930.987:421): avc: denied { map } for pid=9238 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:13 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x5e31) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)="df623829877c66d9dc18d0bf7ff33e99e4f4e2539f8018a0f5", 0x19, r0}, 0x68) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 00:32:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)={0x0, 0x1, 0x0, 0xfffffffc}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf32}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000180)={0x0, 0xb5e1, 0x90, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) ppoll(&(0x7f0000000100)=[{r1}], 0x1, &(0x7f0000000140), 0x0, 0x0) 00:32:13 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\xeb\xff\xff(1\x18\xc7\xc1\xde\xdc(,J\\\xc4hM=\xf4\x04\xd0\xe9\'rT\x8dm\x1a?\x1a\b\x93\x82\xbf\xfe\x83\xcb4tX{$\x9f\xbfHY\x1e;\xd0\xcf\xdb&\x12G\xfd\xd7\xe71\xd8K\x9b\xc9\x04C\xf5$\xd0\x93k\x12u\x9eMM\x03\x00\x00\x00\xc8\x83\x16\x9c2)\xaa\x9fh\xa4\xd2\x0f\x98.\x06t^\xc0\xcd\x95\x81*\xece1\x9e*3\xfa\xb5=\xd2\x1e-\xd3]}\xa7\xbfDZn\xd4\x82\x19\xfb\x1bjE\xc3D\xd8\xd56G\xd9\xc3\x90\xf5\xb9\xdc\x98\xb8\x8f=\xdf\xf0,e\x1dl\xe0\xc5\x80\a\xb1\xad\xbf\xc5\x88!j\xce\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000500)=0x7) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040000000000006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f065581fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) 00:32:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000faffffff0000ff010000000000000000000000000001e00000010000000000000040000000004e220000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000b36b6e000000000000000000"], 0xb8}}, 0x4004) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x4, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r3, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x2711, @host}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x32, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x21) 00:32:14 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x5) readv(r0, 0x0, 0xfffffffffffffe71) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) r4 = geteuid() r5 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002ac0)={0x0, 0x0}, &(0x7f0000002b00)=0xc) syz_mount_image$hfsplus(&(0x7f0000002800)='hfsplus\x00', &(0x7f0000002840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)={[{@uid={'uid', 0x3d, r6}}]}) r7 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000002ac0)={0x0, 0x0}, &(0x7f0000002b00)=0xc) syz_mount_image$hfsplus(&(0x7f0000002800)='hfsplus\x00', &(0x7f0000002840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r8, @ANYBLOB="2c00d4d1187c209e96296ec920a1361db817da179c6556e23f149329c3568531d8883a68899e16dab572e0009db3c3e363e261f33081fc18270cf91b7e5ad558a0836c2530dc9b8255ba02391990c5649f815727545e18a20f8003f7fc3299b28aad5a380ff38b4beacaefd9fff244ddaba3da274cb2677169594d09676b01d75f823a508b0b4fbf894bd9fb6db5f6ef6ef71bb62298469376fa2d3d25beabfe38031d796d45315e7d1ce13aef29dcd52481b009"]) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x40, 0x7, &(0x7f0000000680)=[{&(0x7f0000000280)="8082412aa14974801b9b0c5f84b6a95274f8cc4b5662a598ea1719a77f5f11cfb7143650aec2a9925390a435846e56a2dbaf2b", 0x33, 0x8}, {&(0x7f00000002c0)="14095c4406c9f14145ad0d32a6b996c82a0aa44d3ad21a199994970ba0f4deb0251f5974dd93356e0a1ca903c58d5049d18b7115aa723509685975e743beacabcfb35f65e4770175ca667c3ad98a40a96b751c1cea6720b7412b7043da7a69579054a5b425de94e4e457c7507a91c98bf9f4a902aa4a324ddb8c267c1359a86b8f48db0bbd760f922734528e4cad04600b20803d2eeada0615a25d3f2c6c4911047727bda3979c455ec094c12a751e87db93045d22ac59d3e4e114314902d42f62f095b394b2765f59e87428ec56555ef3d7da4a49a882be961d8c59916f6fcfb6da25c0fccd5de0fa75a9fb65228e70bf12e736ba", 0xf5, 0xffff}, {&(0x7f00000003c0)="de05be693f9ca880e01edbe0a522665c2947b828c120", 0x16, 0x9}, {&(0x7f0000000400)="2f18734de69a9a716f8d513a3522e5df7718ecadb7432c8e5d41c13bdf44cb89ced3bbd34d6caaa45ad52bcc90ca25bba01557f10ef3e91608f7532e51ed5d538a6b93e6e25427aab0cf79c80132f7d780e379f4bf04f63c39e6c39c935d74ce76885f4a1e145968665341a50a628cd401444903363c68abcb5bc7aef5cae3703934b5848fd71aa03d328a2efa3928fbd4c5ed920d7904cc6b6ce5e7bf3ed2a87fdd072c39b5d56f6507bb429670a64903dab8f31ce4da", 0xb7, 0x39}, {&(0x7f0000000500)="49e847ac48335068e21ec358e69a1004f7735ac150a957", 0x17, 0x7ff}, {&(0x7f0000000580)="d044d329d26635e9fb888b918b3a499b7ab06a2fd15e358f2b16d3dd989cf5f094797ce9589e0a528f548e92101912d72cb0340f5a451f511ac2014907807848840f0203c75ec38ba02cf8d57230f38e3360264b7883f119fafdb1daf8d54521de31c04c0518", 0x66, 0x9}, {&(0x7f0000000600)="fefb90f944025c11edf874e583e9926295c9027875c1291ade5d6b19cc1c32a7af07789303d8a81ba9866f13d8894b0d63d77418c0f0f4d2ea9bce8f425d3d785b471d49c3755eef05f3378ba553426f25a96cd54e2e4523621eb8f24a00c9cb1705222210a693252e5ed71ab03a091e239723", 0x73, 0x1}], 0x40010, &(0x7f0000000980)=ANY=[@ANYBLOB='hash=rupasov,jqfmt=vfsv0,subj_type=ns\x00,uid=', @ANYRESDEC=r3, @ANYBLOB="2cb3cb64937d1a6e6aa3d1a93d", @ANYRESDEC=r4, @ANYBLOB=',fscontext=system_u,fowner<', @ANYRESDEC=r6, @ANYBLOB=',hash,fowner=', @ANYRESDEC=r8, @ANYBLOB=',\x00']) fcntl$setstatus(r2, 0x4, 0x46802) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r10 = fcntl$dupfd(r9, 0x0, r9) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r10, 0x84, 0x8, &(0x7f0000000100), 0x4) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r12 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r13 = getpid() tkill(r13, 0x9) r14 = getpgid(r13) fcntl$lock(r12, 0x24, &(0x7f0000000140)={0x2, 0x0, 0xdb86, 0x3, r14}) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r12, 0x0) ftruncate(r2, 0x48280) r15 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r15, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r11, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000700, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0x0, 0x0, 0xe07000}]) 00:32:14 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x101000) setsockopt$inet_dccp_int(r0, 0x21, 0x4, &(0x7f0000000080)=0x486, 0x4) r1 = getpid() tkill(r1, 0x9) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r3, &(0x7f00000000c0)) 00:32:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x10000) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {}, 0x1110600, 0xffffffffffffffff}}}, 0x90) 00:32:14 executing program 0: ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000000), 0x4) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000140)={0x5, 0x6, 0x4000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) accept$inet(r1, &(0x7f0000000300)={0x2, 0x0, @local}, &(0x7f0000000340)=0x10) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) dup(0xffffffffffffffff) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, 0x0) mq_open(&(0x7f0000001380)='eth0\x00', 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x0, 0x363, 0xce4d}, 0x0, 0xffffffffffffffff, r3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = dup(0xffffffffffffffff) syz_open_pts(r6, 0x0) epoll_pwait(r6, &(0x7f0000000200)=[{}, {}], 0x2, 0x0, &(0x7f00000002c0)={0x100000000}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) sendmmsg(r5, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="4a6fe2c97989662ddc969b0e8c644c5cfd6784debd5ee2f755249e8d6f860d4f42565d1d06326ff86aa1140ab9a036fb39bd600e62a572a9e31ed283503be6ba4c44ad5dad0fff1b3554ce6b746ad035abf6d796c12fb93da83424238b01f09ceb2696a3fb1f38493dafdb94603fc1f7594ddbb52f6e0d5e5292c788a313371ab19a73b547ac1499791d9853", 0x8c}], 0x1}, 0xf0ffffff}], 0x4000000000002e0, 0x0) 00:32:15 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) [ 248.624995] hfsplus: uid requires an argument [ 248.722030] hfsplus: unable to parse mount options 00:32:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usag%_percpu_u|\"w\x90\xf6\x1c\x98ser\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = creat(&(0x7f0000000000)='./file1\x00', 0xaddfcb1766a94d32) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) r2 = socket$key(0xf, 0x3, 0x2) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) r4 = dup(0xffffffffffffffff) syz_open_pts(r4, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x20000, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r7 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) r8 = dup(0xffffffffffffffff) syz_open_pts(r8, 0x0) r9 = dup(0xffffffffffffffff) syz_open_pts(r9, 0x0) r10 = dup(0xffffffffffffffff) syz_open_pts(r10, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000380)={0x8, 0x3ff, 0x9, 0x0, 0x0, [{r4, 0x0, 0x1}, {r5, 0x0, 0x3}, {r6, 0x0, 0x3}, {r0, 0x0, 0xffffffffffff4207}, {r2}, {r7, 0x0, 0x6}, {r8, 0x0, 0x8}, {r9, 0x0, 0x5}, {r10, 0x0, 0xffffffff}]}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(r12, 0x4, 0x800) ioctl$int_in(r12, 0x5473, &(0x7f0000000040)=0x3f) request_key(&(0x7f0000000340)='asymmetric\x00', 0x0, &(0x7f0000001c40)='#\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40000) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c289030086dd607660511a090ca9b900303afffe80034300050dff00000000000000ffff020000000000000000000000000001860090780007030060c5961e00000000030400000000000018030000050000011145000000000000000000"], 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000240)) splice(r12, 0x0, r11, 0x0, 0xa312, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) close(r2) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) r13 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSND(r13, 0x8040451a, &(0x7f0000000000)=""/216) memfd_create(&(0x7f0000000280)='@(cgroupvmnet0+{\x00', 0x0) 00:32:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa, 0x0, 0xffffffffffffffbd}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) fallocate(0xffffffffffffffff, 0x20, 0x0, 0xfffffeff000) r2 = open(0x0, 0x141042, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) fallocate(r2, 0x20, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='pids.events\x00', 0x7a05, 0x1700) 00:32:15 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000240)={0x62, 0x29, 0x1, {0x3, [{{0x8, 0x3, 0x2}, 0xbe, 0x8, 0x5, './bus'}, {{0x40, 0x0, 0x3}, 0x0, 0x0, 0x5, './bus'}, {{0x4, 0x1, 0x5}, 0x5, 0x0, 0x5, './bus'}]}}, 0x62) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) shutdown(0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x4) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000200)) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) ioctl$KVM_SET_ONE_REG(r5, 0x4010aeac, &(0x7f00000002c0)={0x2}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, [0x2, 0x10001, 0x4b2, 0x7, 0x8, 0x6, 0x857, 0x20f, 0x101, 0x1000, 0x8, 0x9, 0x7fff, 0x20, 0x910b]}, &(0x7f0000000080)=0x100) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 249.417460] kauditd_printk_skb: 216 callbacks suppressed [ 249.417475] audit: type=1400 audit(1569889935.887:632): avc: denied { map } for pid=9360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 249.578110] audit: type=1400 audit(1569889935.927:633): avc: denied { map } for pid=9360 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 249.767629] audit: type=1400 audit(1569889935.947:634): avc: denied { map } for pid=9360 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 249.960769] audit: type=1400 audit(1569889935.957:635): avc: denied { map } for pid=9360 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 250.190774] audit: type=1400 audit(1569889936.027:636): avc: denied { map } for pid=9360 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 250.305592] audit: type=1400 audit(1569889936.077:637): avc: denied { map } for pid=9360 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 250.514885] audit: type=1400 audit(1569889936.087:638): avc: denied { map } for pid=9360 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 250.807244] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.807672] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.813424] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 00:32:17 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x1b}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0), 0x1c) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 00:32:17 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() tkill(r1, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000300)='net/dev\x00') ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000480)={0x2}) tkill(r0, 0x9) r3 = gettid() r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$VIDIOC_G_AUDIO(r6, 0x80345621, &(0x7f0000000400)) kcmp$KCMP_EPOLL_TFD(r3, r0, 0x7, r4, &(0x7f00000000c0)) r7 = getpid() r8 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r8, 0x0) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r12, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = dup3(r10, r12, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r14, &(0x7f0000000340), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r14, &(0x7f0000000940)="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", &(0x7f0000000740)=""/59, 0x4}, 0xccc3830bcbfdedf6) r15 = fcntl$dupfd(r14, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000001680)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000016c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r15, 0x84, 0x23, &(0x7f0000001700)={r16}, 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r16, 0xffffffff}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f00000002c0)={r16, 0xfff, 0x2, [0x7ff, 0x0]}, &(0x7f00000004c0)=0xc) tkill(r7, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xda, 0x0, 0x1f, 0x4, 0x0, 0x9, 0x9, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7, 0x80000001}, 0x8, 0x0, 0xffffffff, 0x0, 0x7, 0x1, 0xfff}, r7, 0x7, 0xffffffffffffffff, 0x5) r17 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/60, 0x3c}], 0x1, &(0x7f00000001c0)=""/105, 0x69}, 0x100) sendmsg$nl_route_sched(r17, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c0000002400120727bd7000ffdbdf2500000000", @ANYRES32=r18, @ANYBLOB="00000700000006ff00010000c44148490000000002000000020020000800020008000800"], 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x8040) r19 = getpid() tkill(r19, 0x9) ptrace(0x11, r19) 00:32:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000540)=ANY=[@ANYBLOB="00e8533dd271e809fa0600000000000000"]) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f00000004c0)=""/80, &(0x7f0000000280)=0x50) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0x5) r3 = getpid() perf_event_open(&(0x7f00000000c0)={0x1, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) r4 = socket$pppoe(0x18, 0x1, 0x0) r5 = open(&(0x7f00000003c0)='./file0\x00', 0x400000, 0x8c) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f0000000400)={0x0, 0xffff0000, 0x319dc696}) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x5, @empty, 'bridge0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f000000d180), 0x4000000000000eb, 0x0) rt_tgsigqueueinfo(r3, r3, 0x80000000016, &(0x7f0000000100)) ptrace(0x10, r3) unlink(&(0x7f00000002c0)='./file0\x00') getpid() writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="d37e07a0b7c60ea2c3e15400c8635aeb37181ae6a74b1f8bb1020ec0706b6ed0199b7b8514c9ba5afcf17a01d8e446f7d43c32df1cef6aee735ce7a73cb2c9569e19400fa305f124f4ed9caad4e3bd2f233be7e2bc1609ecd1a0b363849dfc2ada49bf82fed83e1d", 0x68}], 0x1) r7 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x40000fffffc, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r7, 0xc008ae67, &(0x7f0000000480)={0x6, 0x6}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000440)={0x0, 0x8a}) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) 00:32:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e74635a5ad6fee7a7c07ef41", 0x12, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x10001) pipe(0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) pipe(&(0x7f0000000580)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) fcntl$getownex(r4, 0x10, &(0x7f00000015c0)={0x0, 0x0}) ioprio_get$pid(0x2, r5) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000004c0)={@x25={0x9, @null=' \x00'}, {&(0x7f00000005c0)=""/4096, 0x1000}, &(0x7f0000000080), 0x1}, 0xa0) write$FUSE_DIRENT(r3, &(0x7f0000001600)=ANY=[@ANYBLOB="c80f267f2c8e32329429bc7195e1c17e24239b495fb46adad71b27d700060fb02a440210a872ad439a9819e722988e5b43d5853b199ddc6b2cb69e70e7869301062959a2eb0aabdc5cb8aa40de1e21e7bfa941afc933f804ba05ea89f425f8cbf69d6d48e9174d3f90456913d1ed6b295652e2766d5b4182e87dc64c61877e8404eee3e6a98f9fbd25271420fdb96179a809cd53bdf6a4b0b63782856f28a31a141f0f6ecfffec293ca536d271607a2e79670bd5"], 0x1) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f00000000c0)) syz_genetlink_get_family_id$nbd(&(0x7f00000016c0)='nbd\x00') prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffc000/0x2000)=nil) 00:32:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000280)={0x1, 'ip6gretap0\x00', 0x3}, 0x18) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) lremovexattr(0x0, &(0x7f00000007c0)=@known='trusted.overlay.upper\x00') r3 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, &(0x7f0000000240)=0x2000, 0x4) fallocate(r3, 0x0, 0x0, 0x10001) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) r6 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x375) fsetxattr$security_capability(r6, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) r8 = dup(0xffffffffffffffff) syz_open_pts(r8, 0x0) r9 = dup(0xffffffffffffffff) syz_open_pts(r9, 0x0) accept4$packet(r9, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14, 0x800) bind$xdp(r8, &(0x7f0000000340)={0x2c, 0x6, r10, 0x3e}, 0x10) syz_open_dev$cec(0x0, 0x0, 0x2) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, 0x0, &(0x7f0000000040)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3, 0x18, 0x0) close(0xffffffffffffffff) r12 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r12, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r12) sendfile(r0, r2, 0x0, 0x102000002) 00:32:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) ftruncate(r1, 0x1000000) r2 = socket$alg(0x26, 0x5, 0x0) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000080)={0x0, 0xffffffffffff0000, 0x1, 0x8, &(0x7f0000ffc000/0x2000)=nil, 0x4}) 00:32:19 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/45) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ptrace$pokeuser(0x6, r0, 0x2, 0x2) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:32:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)="11dca50d5c0bcfe47bf070") getsockopt$inet_mreq(r0, 0x0, 0x47, &(0x7f0000000040)={@multicast1, @remote}, &(0x7f00000000c0)=0x8) syz_read_part_table(0x4c00000000000000, 0xaaaaaaaaaaaacc2, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff0a000000ff07000000ffffff82000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) r1 = open(&(0x7f0000000100)='./file0\x00', 0x6cd1b03d29eb7a04, 0x41) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000140)={0x8}, 0x4) 00:32:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="2e26ff56", 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(r1, 0x4, 0xa1a3f945407a2941) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) [ 253.762913] loop5: p1 p2 p3 < > p4 [ 253.812990] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 253.909979] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 254.001314] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 254.493482] kauditd_printk_skb: 429 callbacks suppressed [ 254.493496] audit: type=1400 audit(1569889940.957:987): avc: denied { map } for pid=9504 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 254.595337] audit: type=1400 audit(1569889940.967:988): avc: denied { map } for pid=9504 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:21 executing program 1: ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000000)={0xb2, 0x2, 0x4, 0x9fb, 0x8001, 0xffff, 0x1, 0x8, 0x0, 0xd5, 0x8, 0x6, 0xf001, 0x9a, &(0x7f0000000300)=""/209, 0xb23, 0x6, 0x5c}) set_robust_list(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) write$char_usb(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) fdatasync(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/230, 0xe6) 00:32:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0) pipe(0x0) sched_setscheduler(0x0, 0x5, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f00000002c0)=""/180, 0xb4) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x138, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x0, 0x8001}, 0x8) 00:32:21 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x101) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', 0x0, 0xa90, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="67a5cb42d3ed5f202e231f0c1cde4049b42970386e9da006", 0x18, 0x2}], 0x8000, &(0x7f0000000180)={[{@fat=@nfs='nfs'}, {@fat=@nfs_nostale_ro='nfs=nostale_ro'}, {@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}], [{@seclabel='seclabel'}]}) ioctl$TIOCEXCL(r1, 0x540c) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r3, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) [ 254.685260] audit: type=1400 audit(1569889940.977:989): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 254.783833] audit: type=1400 audit(1569889940.977:990): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 254.964811] audit: type=1400 audit(1569889940.987:991): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 255.102017] audit: type=1400 audit(1569889940.987:992): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 255.265947] audit: type=1400 audit(1569889941.047:993): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 255.385200] audit: type=1400 audit(1569889941.047:994): avc: denied { map } for pid=9504 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 255.431510] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.442125] audit: audit_backlog=65 > audit_backlog_limit=64 00:32:22 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) gettid() sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 00:32:22 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r1, &(0x7f00000000c0), 0x5) 00:32:22 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 00:32:22 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r1 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) r2 = geteuid() getresgid(&(0x7f0000000580), &(0x7f0000000600), &(0x7f0000000400)=0x0) r4 = dup(0xffffffffffffffff) syz_open_pts(r4, 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000440)={0xe, 0x2, 0x1, 0x80, 0xb8, "20718b18abee239156d2fb9d757758324ee570656c2213a81c0a83ed5f9452db8aa3da3e3c5a012eca499099a182439d97592cddf77b19b7f2e9b0d58bad0b6830247b5bfce8eb2094e3135fb92d039a117019120bd7d13a0b2f80180befbdf3db3a5024c35a3169146e8eb06e47f079b04fc10148d5a6297d671da6d8c88b490b1e7ed4babbe124dddf257e937fd73aa4a24ffca304721238209493334df8999ae22a1ed1590559ba90e6c4dabf5d8dd4db5f9dbf8306e5"}, 0xc4) chown(&(0x7f0000000080)='./file1\x00', r2, r3) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) mkdirat(r5, &(0x7f0000000280)='./file1/file0/file0\x00', 0x10) mkdirat(r1, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) 00:32:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x3, @broadcast, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 00:32:23 executing program 3: r0 = creat(&(0x7f0000000040)='./file2\x00', 0x9) close(r0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) 00:32:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/create\x00', 0x2, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x2) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000000)) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) splice(r1, &(0x7f0000000040), r2, &(0x7f0000000340), 0x7fff, 0xd) r3 = getpid() ptrace$peek(0x2, r3, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/access\x00', 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x03\n', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 00:32:24 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xffffffffffffff33) keyctl$get_persistent(0x7, r1, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYBLOB="73ac49cfac03f91b89dfa4e9dfcc040f71a5581327e679c20c9f5067b44e41ff9083364e1970b80f58f202d816943d69bba5667623d70c1f072f800fded558bb8fb83d07a94e0a"], 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x1fe, 0xf0d8, 0x80000000}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) getpgrp(r4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc096}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r5, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r6, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000001c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x4}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000001fc0)=ANY=[@ANYRES32=r3, @ANYRES16=0x0], &(0x7f0000000100)=0x2) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) r8 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0xfff, 0x111600) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000800)) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) 00:32:24 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x75, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xa8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffcb, 0x8002) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, r3, 0x214, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4d1c}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x240048d5) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f00000000c0)=ANY=[@ANYBLOB='\b']) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r9 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 258.484075] bond0: Releasing backup interface bond_slave_1 [ 260.457972] kauditd_printk_skb: 213 callbacks suppressed [ 260.457987] audit: type=1400 audit(1569889946.927:1165): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 260.544192] audit: type=1400 audit(1569889946.967:1166): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/root/syz-executor.1" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 260.621836] audit: type=1400 audit(1569889946.977:1167): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/root/syzkaller-shm637754820" dev="sda1" ino=16461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 260.701148] audit: type=1400 audit(1569889946.977:1168): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/root/syzkaller-shm829525398" dev="sda1" ino=16492 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 260.753295] audit: type=1400 audit(1569889946.987:1169): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.786760] audit: type=1400 audit(1569889946.997:1170): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.825031] audit: type=1400 audit(1569889946.997:1171): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.854467] device bridge_slave_1 left promiscuous mode [ 260.856946] audit: type=1400 audit(1569889947.047:1172): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.882586] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.894614] audit: type=1400 audit(1569889947.057:1173): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.929259] audit: type=1400 audit(1569889947.057:1174): avc: denied { map } for pid=9585 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1161 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 260.972433] device bridge_slave_0 left promiscuous mode [ 260.978966] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.208046] device hsr_slave_1 left promiscuous mode [ 267.250527] device hsr_slave_0 left promiscuous mode [ 267.301164] team0 (unregistering): Port device team_slave_1 removed [ 267.338651] team0 (unregistering): Port device team_slave_0 removed [ 267.360874] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 267.427022] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 267.591774] bond0 (unregistering): Released all slaves [ 267.700630] IPVS: ftp: loaded support on port[0] = 21 [ 267.884958] chnl_net:caif_netlink_parms(): no params data found [ 268.047471] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.065386] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.073859] device bridge_slave_0 entered promiscuous mode [ 268.094206] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.111109] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.131998] device bridge_slave_1 entered promiscuous mode [ 268.179608] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.189957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.213831] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 268.232480] team0: Port device team_slave_0 added [ 268.242565] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 268.281608] team0: Port device team_slave_1 added [ 268.287687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.303580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.388110] device hsr_slave_0 entered promiscuous mode [ 268.425546] device hsr_slave_1 entered promiscuous mode [ 268.465873] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 268.474109] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 268.551324] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.559344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.566066] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.572859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.652008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.680157] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 268.711786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.738961] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.759698] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.783110] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 268.800356] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.830354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.848399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.868375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.888103] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.894650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.932815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.941032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.974008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.990692] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.997232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.035007] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.043942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.062001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.089717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.107827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 269.138510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.151013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.181350] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 269.192898] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.218083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.239664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.261565] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 269.278149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.290180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.321154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 269.339156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.359465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.381246] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 269.397784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.446361] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 269.496692] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.668642] kauditd_printk_skb: 4 callbacks suppressed [ 269.668656] audit: type=1400 audit(1569889956.137:1179): avc: denied { map } for pid=9590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 269.757701] audit: type=1400 audit(1569889956.177:1180): avc: denied { map } for pid=9590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 269.823001] audit: type=1400 audit(1569889956.187:1181): avc: denied { map } for pid=9590 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:36 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x200, 0x24, 0x1, r2}) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000100)) tkill(r0, 0x9) r4 = gettid() r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r6, 0x89e8) kcmp$KCMP_EPOLL_TFD(r4, r0, 0x7, r5, &(0x7f00000000c0)) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$netlink(r7, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x10}, 0xc) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4473866ee5fcac21, 0x0) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r12, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = dup3(r10, r12, 0x0) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r14, &(0x7f0000000340), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r14, &(0x7f0000000300), &(0x7f0000000040)=""/59}, 0x18) r15 = fcntl$dupfd(r14, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="0300f2ff3413b961061f967d7138dcf2b25f138aec83247565d7dbc4294919418143a0fe49", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000016c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r15, 0x84, 0x23, &(0x7f0000001700)={r16}, 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r16, 0xffffffff}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000200)={r16, 0x38, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x17}, 0x42e}, @in6={0xa, 0x4e23, 0x200, @mcast1, 0x2}]}, &(0x7f0000000240)=0x10) [ 269.931881] audit: type=1400 audit(1569889956.187:1182): avc: denied { map } for pid=9590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:36 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x4080011, 0xffffffffffffffff, 0xfffffffffffffffc) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000e1, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) geteuid() r5 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x202, 0x80000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r6, 0x0) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x7, 0x7f, 0x1, 0x6}]}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000140)={'syz_tun\x00', 0x600}) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000100)) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f00000000c0)) r7 = dup(0xffffffffffffffff) syz_open_pts(r7, 0x0) sync_file_range(r7, 0xfffffffffffff021, 0xffffffffffffff88, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) listen(r0, 0x6) connect$inet(r1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) sched_getparam(r8, &(0x7f0000000240)) 00:32:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000, 0x6, &(0x7f0000000840)=[{&(0x7f0000000280)="2afab4db2559299d6b3b3853512f0a2545426cccc4b661eb0ed075f73fd6e0bb803a6ee23352ce58b3d79022460504d3bee83c171d8aa05a440d832e19a77d3f914b74c1b32bf23b5a7d7c13c85f9751da1a316d269493e592762bcc9e4e89fee71f24ac4d6e3dd74ce42052db81de36dd44a85687637ac4bd8c63826176600220dafe850722b40b24f392db591a9d0c4553e4d22de6c5f9ce6fd85f9207bd7ededfe49ab57b9444af2e3f6053e2f0ef7e2ea98f878a78ad19ade30f55a55044fc04aced70a3e0c28e24daec", 0xcc, 0x4}, {&(0x7f00000004c0)="74f7e882f28bf566522dd6e1debcf3652c28c87cabc73dcac09dd16884d1a1975143854924a54b86d259b06364997aa331ecb8d3ce37b694afea68003ce9bd766bba6f035e4ea4c9deedc378c8da7de5f8e970036612b6af5f6d3c72700b542556c45f0ef5732d0d2a6030902e9ee7f8416276ccf9d5ef49c3bb83ce438f90fccbdb98a820a4d0bf4471ee9478c0637da4fd716a93c5003256e546fed2abc68ecdf10bf4bee6309e71dd404bb13b54a5b15035ae50b6719b57ddb07a0f07d9a6c4c069d73b74e42e83652ad48844ede74a7d03875b", 0xd5, 0x80}, {&(0x7f00000003c0)="5c8ca51e82f358b6d89781911fed0b4a98af4974543038b1894a277509b9ce37a4b93e26d3da770d8afe25d089c4fc1588a156bc54bd92e714c4283c26fa7a6d85674a6a4791196d90c3ce0113682cb5a9e7d00474ae63c98443d56f3067f7", 0x5f, 0x9}, {&(0x7f00000005c0)="8870d823d8dd3278d0bfc57eb49d0d2fccd7c21b894b745cec0bb493d7ec9a1fec67e53bab2f018efcfcb834df60344241db315a2a74cd1d683a67b41f65226af6df41144425ac50f83d436b21250536145bdd2411747b14daba2d30415a5f5d79643af8712cc5017e0d19a8c11fc063a8957752e477e114099a776cc23bf08ff25e399fb4fe5bf00b5b7c9a59efb3a432b8f0f8f6e2fc7bafa2765a0ddf10", 0x9f, 0xfffffffffffffff8}, {&(0x7f0000000680)="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", 0xff, 0xe0}, {&(0x7f0000000780)="ae1a03868a671ad265ca8950fae5081a4070db4708b34e219120f5a53e6c5b40cf5e5f6ce95d17e513b34ffaea2a381553e49923ca8215f6daf73744d8d3c4dd5264858eea124cd70336e6f73d9fb856421adf2d82369efc4e7f0ba8aec38bb5d3505bd408a2348eab08b630b1b5158698b8ab719445fa50095456ecf5c95ab2e8cf8666526e5aa6c09e47bb4b023282b377ed01a7ece5c43a0986640eec130d226bcf37", 0xa4, 0x20}], 0x0, &(0x7f00000014c0)={[{@session={'session', 0x3d, 0x2f}}, {@utf8='utf8'}, {@nocompress='nocompress'}, {@check_relaxed='check=relaxed'}, {@unhide='unhide'}, {@uid={'uid', 0x3d, r2}}, {@overriderock='overriderockperm'}], [{@obj_user={'obj_user', 0x3d, 'user%]ppp1ppp1wlan1/'}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, '9p\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'trans=fd,'}}]}) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) r5 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002ac0)={0x0, 0x0}, &(0x7f0000002b00)=0xc) syz_mount_image$hfsplus(&(0x7f0000002800)='hfsplus\x00', &(0x7f0000002840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002b40)={[{@uid={'uid', 0x3d, r6}}]}) syz_mount_image$reiserfs(&(0x7f0000000e00)='reiserfs\x00', &(0x7f0000000e40)='\x00', 0x5, 0x5, &(0x7f0000001100)=[{&(0x7f0000000e80)="0c471f361f348a3856d9059cd78ba0beead4383463972a8742d3b242b52e29bfc9716d7a6c38bbf047", 0x29, 0x5}, {&(0x7f0000000ec0)="01faab64e3598fe57bc90e71eed93da5c985fbe5fbb802636f79eeaec2f33d1406e545be342da6c94039d9159f", 0x2d, 0x21}, {&(0x7f0000004480)="ea19635b41020227d5a4465d0dc19a8affef373df8d8eb1014da1414f56ef4408138fb8f75e2557e1ac5712700d504a97a7e19b3a61f26f7923dd7391db37606fc7f69da1a7d2a8b559faae086d38a16a89000a41c1532e9edc6ce2c5e6822260892d30ccdcafe4747af5c7a9a6d5284e53349e52304c80d6dbe778ff2c75738aa795dff4a350fac1b867e8431ff59253512749c3646f0f7101e53bb108ec59b6ba0584529d45e70660b330b9c9b6cabd98fea2a492b1c6bdc892fa47a38630f6cf171539402ef5c4acc0c0d897254def99faf7f7b488d03ad8e26594b1eaaf7819374b92714b9f19708143ddbdcaf09428c16a2e21f2540ba3de9fa3c5a903b81d3f85f0c1c0efa88a7adde444e12b8b78d21231eeabc804db2117cca7bba86f856515a3b2b40a3f14d2c377701500cd0151cf35ab57764480f5f4209423a8b63daf245b9ebede1f725809707b923f4e694752599f3518e3926dd0430f3607f698996833b90067a44e394d7a81ba2a1dac7b1061245351c9d9ba287e7326dec27ff004c41c1c4e1523bd8b3f05ec895e63daca720663cf1528936e21c8fcef0a5dd76209f52a0d3265fe8cf37a4622a425c38f92c8bfe265a11ed8d7594625d42479490f4387f3636e9aaaa4f7f77b7450caef467e444c09b06e35ddc2a0a2900ef6f3479222ba20a89eb40f601d647b9b3176297b056831aa4503473fa103a4299651b3ebaabc5fea512222ea0f2bac3c3a7aba2c24a37b951191b58b186cea8fe2dea7840e0e6ad4fadbce1add4496b731f5fcc29057e49bad2281d72b95370408e0ba21da9b4784ef4a4003d6fe055a314cb5b5879ca622b0be363fcab0d0d4aefb7289b1a27337f83eac6ca7e5f6ea1c68e5c26a01b5559f78a459d5b24dad55726e867c44fe20fc3a35cecdbe86b41b2a66c68b9561e2975f6676664c5155017c7254af19290fd69bcb5a7a67780a5829235d23b8e99f48b463859cb6abc166806c42ad245d5b78c88fac71848918b2db894bd46ecf5ae799c72a7b72230a30bf82a76906047198a145d364f403c758ba57a6a193cc05d44fccfbb9c41e712f94036f521bc8e4eb0edcfdfa6eac92cc4af475b25884f2d498c5a92af5eac34163cad911f9504c65fa28dad907f6e587da83205448d74d3a8f8da8ba555dce02d4774861a9d875ef8ad05cd7cfcdf87e3712bc75d63f1624831ff9179f1b44d0321e769520172100a4f3176b4629b2e6d0da1e41c68da44fc4e66805076b5bffc01ba9dca926882916f8b96aa2c39f6c8b2db5fcc0c5f4152cce596773ec35d876c925a49b17b9fc07cb08a5b4b598a75b1bb77d92ab96d0199b0162610001729bd233c4c80712ecb3461dbfba5326d1c7a4cf94770e1783e73ba68b4404791d86f7a589e9827ce6269fb3a3d9e5fdd4a2c5f6768e3e97dfca7a42c26f41eb2962bf71b3d409ba82d7ba131e6de9d200b26cb341b7ccd7cdb2581323de8315ebcb8e7c6915c71f9d7990cd249f56b5a297e20f251ba9be7243bcd97d7916edd8cf7cb5ea74e1760149ffab0d35f09f442c4f8ca093541d7936ba81507be9645a3222bd78c5b08038577d1f14c3cb45cf9a5e432a10c538b2b6201b7445d61c918e64e82cbc9b78801ddfc3acabcead51fc92bc01b134d3baaaee145e91a6cc8026acf8413445b54e6520a5577cce1d729e3c50b24acdc878224795c98689548429e4dd59e0caa3d58c8642e7595b2c7a686e4c458a1d969b811d1bdffd57b899305e210492980a41b9b5f95501f82fa3844d733aebdc29dc4c9cf60ff52ee76a56f7750f9f8e1533ab24e4ba3a79aa045ccfd33a9d63427ef65d56c9ca2f40626d0509e7af1335904d5ed9a7ace745f1750752eb3870aea964940c3f47a98775353f5b15298d426fc81721cd81406fa820761e49b68ac5c5ce45b96f2ba71033478b919879883f2c4634b4effd1ea5af4eb7d515fdb885290e00a8150f871cb98a63603c7a5d3b22db8109137b2b6df714beb920f409d5f81db69a190a79c171d944f465da27245e8af7c5e42c9a150392d312ce705a7a485e6e483462c1ae4f9104c170d96bce6d7b39a2ebe33970356e382693d7951a68bbf48b4a42b55afc96023af57c1236bd843a87be938cc443b6e64ae1ca96bd2710132d6d3147d0966ca9e20e42a5c831a74542bab59dd632860e7507bb266e2eceac8755ca3bec45e69084ab31a05005b5140d112cf10118072c9980f5b6a71cdbe3ea2dac1604cce91a913c6db556d5391847d615458e2a3b2bb5d953c16d1cda1ad9911f6c69c257a229f253611d9d7fd16417490da7c2900add59655145f17469588363130a613dcb20fadd1d560eb9cb25476bb529b4ab89888be638df7eefa50e722a69042d63daa93e127a0b1fe7b8c3c009a9bdedc155e597c9f7a05b190c5841cd80f45726505be87f0092d1c57d830c0fb88138add42ed246021e749d86bdf8c20fcb0e9a5654e32f401528387f913718f017578f4203ec3a4fcce1aba8992965600ceaf0af278f378fd51257b56aaa3b5eca6ec2bd5c2cdc0b2dea793d0ed9341a220027535855c25efbfaa50183e0a0e6a644a432d61ec8d84bd122d0e40a68d58a316638313c28f00850d2d548fc25cbb9890a5c458d18878193623f184d050cbfd521a03b456768f50831ced5140ac970c6822adcb76595d003fad6ab2e46996014d7a9e27c6c9af193504e01057aa9047f7890b6596b8bb6baa2c60a7cf0f32a6ef3f6aeb2192898a79601728fb29a01249382245fb8d83fc965a117ff7719dcf57952fe6f100913f68fcdec45506330330efb6649a1043990d26d8282832c720b9c0e00a93f7124e9f5a6aa39242ff6efcd538758ed054822eed298aba0da71e09c73b7ee135eae57e9618cb5b38a63afce036da7d9b1c833809ff9dd6bd9ae5b73943e25889a7899242c28f212b45f90385de73feadcb7b7ef305bd6960bd33c56df2842210f95d01baa9f87872d194127a12a0bc2d6171873f0328a33f6621622ec6a8832d0b928e8b4e9dddaeb4f35e3a6a7f67bc597c3a4c914af5fe70f575716c61e67b5ab951807f7c81f47a17741612ad83303b7cd873a7bbd1b8f65fd9a19dd140eb250ffc2faac2fb27f2d658aa9cff283764572b27f9291ec2c5c68d6cd8477c0c675bfaac9b860fd2eec6cf046ac63b065fa886fe8515f586ad46e0e2ff64356f712f36c07b4fe47bcd11d952489e6d20ee0149ef418d492284d6aba668199d2e8253fdbb29292555ec83346820b71d5c3b9b76431b35a36a7d189f019fbecb86c838da103ac0995fd024c2fa2767437a71f161fd214eb01edb2f9f69d3116800004f027806764d6bd53528e6acb6291fde13188a4d404e7941809e04f30518b97f86ecdee9a7dd8fe6534d38f19369350cb3265f78e2de80ceb66894bfc7a5567c04cc538a9c585f63ba39a3d259ee6a386de760c02509da97907bf72ad53c84b648a92c0269188d5087049df96e5ab8045c33eeb37b12c72545f05c5ef375b788e77319783ad5b6cf2ee83a374ea1da0da709645f7fefa6d33b416e2c318fea1f95ad670eddc086cda5cfeb47951df1da1b5b96674a5e1722bc51433e6a31f7aa686161183db6ea35ce0ecdec64a7202b18ad0f3a219ac3254319644e12b7af9ba3985508713bd66ead08566639ce0e20d55fb33963f2607f89e5a305ba5f55c9114bcca0b490af8cd704d7df61e1bc822e3c2b03c184f489defd63648eeb13045daa3055a878f4b43d61d5df70a0343db790ec7bc06478759e8c911a4a1d11be9ef6e8ee9a0e2479d23b4707be7470d2faf7d110f4fc169329282b28f569e7c73a2791583998db6ea90b8d98e6039ef63d88ad55a6a87eafb3b5cb467d9b664b93e8828b9129c6ba847f5adbc5afcf34c33405636d3946ab45a0559b1ec9fb935e2788e0e1736abd4752531caf61cb67f8085422df95b6e5a7466cbd87814300d74a0559637250ed7b66ee4366a2964ed68f5b8b37007cb0c23be71568710f7b25c4489549f3898af548842a8a18175721a21e6afef7e91d4f8f08bb9ca83f3d5795da021edfc07259dc2e4273db4e5613018d59ead61585387e6df07c8f631080e9665528167078be461d1b82ea26af7aa0c566f913f50d543f0193aaf7696d17c8caac141f349c3898b3f95ec48e03209c18369fb8e953193c0e5870bf74c0d572fe485d5fd14cbc0fd4e2511447fbdfc474d1a6b3d95c0daefe92b0a08225e21c725432368fd1fceba75eb0b2a71a71f261656a11f87d23183e22801c2bd30016bea2bccd9c01e4e973ae8a8902687bbfe8adeabb0bfb383f7c285834181411250bbe3b6de63eea4540da174086a034c5fe816b2a9895ded7c5e1b91e2a7dc2f0079560edcfaa99fc7235b6437eb6848a23c885efc6c4cb6374b5ba7538ac0589b0fb2a84c48eec3ad79dd88d835b99eefd246135017cc39d1a98746a86b6b87419cb0fd50be494066bd1989dbb7bbd902387f0eb3cb491239430d23186ca47cfa936a2d082a315aaa53a62b9183ecccb012e9e759fbe81dc9e6e58b38d9f4fec3dccc74e45c157f01b703a2d42a3fd0176bfcc52e9b049207463cd6518a5a5101a1d499b6716bee28e6f33e5dd3ab6ce9832b9aaab2d5e8d06f17cc271461059e1fb738e8bcbb86a20fd96f1ef26cbd227b39ed261c5291011681772503c900c172145c52ab506c6d7622cf72a569cbe7ab266b91c9af3b58bbd767e8b1988b6508fab32e51c1439b38b908852edb1c85375cea799154bef9891ffb1d6ddde0d6b053cf0ad0e161f7f241685dc31b55aab9091e16a6bd559f75f1f1c8e5aa69f476097b2237ce3b1e0813a0ab95c45140050cb8c85ce1f7c1bd442a718e14006266d7a797631fc154d1e48ea89a86c663aa72d8bedd1331d6641e3a2f76fd4a6ce1f0d5ee7f89aaf1f114aa70aa0a0dd4527a3dcd47d40c4e198009d3dc28c64569ed63ccaa7f6673bf74df41493466a7714313fa8bb56bf7638669c53f503817aac51ed47e4c6128664b50bc592e3289080b35de1a407c7c390bc0bb2c499c91a8412701f1ed5fef2637d5f6d300105ddbed41e22376405588703ae1c0d720e13ade8f68b18859b143c701e98fc0bea1cbaa1a3af0835535b34a8bc5b5304706a10426ba87dfebe9d221a011a529cc6ba55c047ebe64d9347d8582f9aed56c118e7fd781f54b015330f9fa5bcc220a420b38b30470153a892999f65887b4c4da9603e9b371eca92b1d117c15e9d6b64ceab5d413d419571ca089481968f311c61652cf21ad90b0abb3fcf67fe905ed1cb2f550edbab95b548937bd05dc315baa855fcafc16984ac967935bb19fa53b0ec468a13f15ccb8b970e29d3bf5c63efa119e4b3e3be66fbfad9f27fdb1fc004af1922f1acc9c06480df1843aa157e20f557cff81f39952337fdbefeafb0c50f89e7d7fc20683e4961c0c9960412411b2327593c35e01af2748c6de0e9d3dc0a41cc579423e9a68c8c90fee264a856ece58f492d6e68725651f22697e327252b2308e2a430d18e0f26b5946b3eab5eb4e8001bebfdf2ac24f673d0838536acd0737fa11912130a3cd3aa8d2bbe45797034cbe6704d5c3b07342321f2523a44a0c27808d7b0820e6223b083ee9e3caad7690b9c0a4f54601595e18e70b24ceaddadf346965eef320369da5b5dc1a42fa53263e1798abe5c7636829e342ca3d7150b74e2827de1e59f80d9214e9d5a01791d67bf0044ed7219aae0f8b27b2bc29d96cea4d184", 0x1000}, {&(0x7f0000000f00)="efafc68e24bc770ae94779df75cb8623e34bf2c4489834a37660fe76bb389bfbc13b141bae6024a1a316d07a41afb5dd294a7db930546702f78ba0902bdb29c0d6ed5457b793ba9f78eafc2df0419cc47547d1e66d99ec2ad2762f35e60dfed85b7cf140b0367902c206d08173a415019c3fb03c72bd1f3d2261f705acf922ed90f745c07d5b752c3298ae1f7944c82628ca2f952bd56f957882af963bdce07d4557abaeb004e3b055ae40ab853eb29d403b03652c2a5287f19de8a8edee10285e080d02c4aa6c66eb0f056613087f1820e1495059bd93297bde67ee0fd5e727b079f08176490f19a1", 0xe9}, {&(0x7f0000001000)="09bed0257aa8fd42da5e3c213e618f42ad482403c2c1beab9021970b0c457a794d8192be7acb53b57ffcc173f09be3e6f8069a1a4547f60dfa0c94f0f1f3b4f614eb0062387315fd6fa268886a83743a8d3a1fd214084bc05d879a6a1d5a04e096f20370d9846768394e7d0c098546d9f368c73e3c910c6367996733a50cad88218b7a288732996b004f32423c3a1a14de5bd464ccf9551e3d536c921ada0cc06c01868dd5f09916d9243bb078272ccf7eb615257402ddfeebd800886174c3a46b83ceb793a91482e4be676119a9f0499eefeb654815507a9dc1de1cbd71955f0bd9808265c37e7af64bd910", 0xec, 0x5}], 0x100000, &(0x7f0000001180)={[{@data_ordered='data=ordered'}], [{@fowner_lt={'fowner<', r6}}, {@smackfsdef={'smackfsdef', 0x3d, 'nocompress'}}, {@dont_appraise='dont_appraise'}, {@obj_type={'obj_type', 0x3d, '\\system]'}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r7, 0x0) r8 = accept4$inet(r7, &(0x7f0000000b80)={0x2, 0x0, @remote}, &(0x7f0000000bc0)=0x10, 0x40800) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r9, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r9, 0x4058534c, &(0x7f0000001200)={0x40, 0x80, 0x101, 0x1, 0x9, 0x48db}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000b00)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}, 0x6, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000ac0)='ip6gre0\x00', 0x6, 0x5, 0xd514}) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="74fba600000000dfc7cb6800000000", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',\x00']) recvmmsg(r8, &(0x7f0000000d80)=[{{&(0x7f0000000cc0)=@sco, 0x80, &(0x7f0000000d40)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1, &(0x7f0000003480)=""/4096, 0x1000}, 0x7}], 0x1, 0x101, &(0x7f0000000dc0)) r10 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r10, 0x0, 0x0, 0x10001) r11 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r11, 0x103, 0x1, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r10, 0x84, 0x7, &(0x7f0000000c00)={0x10001}, 0x4) umount2(&(0x7f0000000080)='./file0\x00', 0x3) io_setup(0x0, &(0x7f0000000380)=0x0) io_submit(r12, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x16c}]) io_getevents(r12, 0x8, 0x2, &(0x7f0000000180)=[{}, {}], 0x0) [ 270.025343] audit: type=1400 audit(1569889956.197:1183): avc: denied { map } for pid=9590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:36 executing program 3: r0 = timerfd_create(0x1, 0x0) timerfd_settime(r0, 0x3, &(0x7f000000b000)={{0x77359400}, {0x0, 0x989680}}, 0x0) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) fallocate(r1, 0x99e61e20e0bb4ab7, 0x1, 0x1) r2 = dup(0xffffffffffffffff) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x201, 0x0) syz_open_pts(r3, 0x8440) keyctl$setperm(0x5, 0x0, 0x9045000) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) r4 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xd135, 0xf01b31ef5d5d76d3) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) socketpair(0x10, 0x2, 0xff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000280)=0x7) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000240), 0x4) [ 270.115121] audit: type=1400 audit(1569889956.217:1184): avc: denied { map } for pid=9590 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 270.296172] audit: type=1400 audit(1569889956.457:1185): avc: denied { map } for pid=9594 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ba", 0x1, r1) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001300)={0x0}, &(0x7f0000001340)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x1866, &(0x7f0000001380)=""/248) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="5039a698e1089e898cfe09b5fdaba5facdae7969c08783e2b4d0aa08a5f16f33610ee7ebbd65159c0937ede8f46b2c43f2535f713b16c40fb2cf8ed09a8368a57818650ebb24535ca4a6074d0138f5d9f51db803d4b0b3301120e5f42d67a058f630973de41d74cfe665ae84b4cfcf3c99d7a3539aae6ca42464962dfeff10c9ca9b11851428a2e77bf347", 0x8b, r2) [ 270.423475] audit: type=1400 audit(1569889956.647:1186): avc: denied { name_bind } for pid=9598 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 00:32:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="000000008bdc7a6b1300000000240012001000010069703665727385616e000000100002000400120008000e0005000000"], 0x44}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', r0}) 00:32:37 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() select(0x40, &(0x7f0000000080)={0x3, 0x1f, 0x80000000, 0xff, 0x9, 0x9, 0x8, 0x1f}, &(0x7f0000000100)={0x80000001, 0xffffffffffff0b0c, 0x3, 0x1, 0x10001, 0x9, 0x0, 0x8}, &(0x7f0000000140)={0xfff, 0x7fff, 0xbd, 0x8, 0x69, 0x1600000000000000, 0x1, 0x8}, &(0x7f0000000180)={0x0, 0x2710}) tkill(r0, 0x7) r1 = gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xfffffffeffffffff) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x9, 0x101820) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r3, &(0x7f00000000c0)) [ 270.611905] audit: type=1400 audit(1569889956.647:1187): avc: denied { node_bind } for pid=9598 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 270.788371] audit: type=1400 audit(1569889956.677:1188): avc: denied { map } for pid=9598 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=32595 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 270.838970] encrypted_key: insufficient parameters specified 00:32:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000d) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') [ 271.308230] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) dup2(r0, r1) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r5 = dup(0xffffffffffffffff) syz_open_pts(r5, 0x0) getsockopt$inet_dccp_buf(r5, 0x21, 0x0, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x20) setpgid(r3, r4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x6, &(0x7f0000000100)=""/4096) fchmod(0xffffffffffffffff, 0x40) tkill(r2, 0x9) r6 = gettid() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r6, r2, 0x7, r7, &(0x7f00000000c0)) 00:32:38 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000080)=[0x3, 0x1], 0x2) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x11, r0, 0x7ffff) [ 271.596476] encrypted_key: insufficient parameters specified 00:32:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0xa2b, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r2) io_setup(0x1000000000000003, &(0x7f00000000c0)=0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x105400, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x3e80000000}]) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x24}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="c7000000340029080000000000000000030000000f0000003b000100ffff0000000000000000b5060000fff2"], 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) 00:32:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c3542ac42cb2f94b098e98f2bcd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xa943708f26830065}, 0x1006) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ba", 0x1, r1) keyctl$chown(0x4, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001300)={0x0}, &(0x7f0000001340)=0xc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x1866, &(0x7f0000001380)=""/248) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="5039a698e1089e898cfe09b5fdaba5facdae7969c08783e2b4d0aa08a5f16f33610ee7ebbd65159c0937ede8f46b2c43f2535f713b16c40fb2cf8ed09a8368a57818650ebb24535ca4a6074d0138f5d9f51db803d4b0b3301120e5f42d67a058f630973de41d74cfe665ae84b4cfcf3c99d7a3539aae6ca42464962dfeff10c9ca9b11851428a2e77bf347", 0x8b, r2) 00:32:38 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={r2}) [ 272.552020] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.5'. 00:32:39 executing program 0: syz_emit_ethernet(0x42, &(0x7f00000000c0)={@broadcast, @broadcast, [{[], {0x8100, 0x1, 0x0, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x3, 0x0, 0x30, 0x0, 0x0, 0x0, 0x84, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x8, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70, 0x14, 0x1e}}}}}}}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xaa771c5a1f50811c, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r0, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xffff) ioctl$KDADDIO(r2, 0x4b34, 0xfffffffefffffffb) mlock2(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) 00:32:39 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7, 0x48000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x806) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 272.836853] encrypted_key: insufficient parameters specified 00:32:39 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r2 = socket$inet6(0xa, 0x6, 0x0) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000000040), 0xffb0, 0x0, 0x0, 0xffa8) 00:32:39 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0xe3, "74f217fe3fd2df4c528b610defff2c0777ef3580e54a55e76b73490da06455c214fe255d15e800d602957eb2b840e477b96153a37fe52f187f103798158fd74ecf69548a6cf17c2c3216a0a11ab0c6782df4727004bfd113c3c9b3b1f726130dcb554355543bcaa33f96af1ee443a73ac7ddbd8e900f60d33309b0f27b4ed4b6b2820020f2c509438d552902b77089522b72306b7a848c071f99ce825b7841b112af840001008c7546f68600f37296a7000000000071bde619dccaf86f9b44ec018ab4cb85f7c92f32d57c4e49d250c38f3d7abd600ce9fef46debcd06bc7e16287bf5"}, &(0x7f0000000100)=0x27ccf16d27fbecc5) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r4, 0x0) write$P9_RLCREATE(r4, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x10, 0x4, 0x3}, 0x8ce9}}, 0x18) kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, r3, &(0x7f00000000c0)) 00:32:40 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={r2}) 00:32:40 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) inotify_add_watch(r1, &(0x7f0000000080)='./file0\x00', 0xa4000c0c) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0xa, 0x0, [], [{0x3, 0x4, 0x3fbb, 0x6, 0x0, 0x3}, {0x6, 0x3, 0x100000001, 0x1, 0x6, 0xcf}], [[], [], [], [], [], [], [], [], [], []]}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="2e000000120081aee4050cecff0e00fa108b5bdb4cb904e473730e55cff26d1b0e0012800d0000005e510bef8d5b", 0x2e}], 0x1}, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7ff) [ 273.963828] dccp_xmit_packet: Payload too large (65456) for featneg. 00:32:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="636f6465706167653d98"]) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') 00:32:40 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) write$P9_RSTATFS(r0, &(0x7f0000000000)={0xffb1}, 0x301) r1 = socket(0x11, 0x80a, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) read$eventfd(r3, &(0x7f00000000c0), 0x8) ioctl$int_in(r0, 0x800060c0045003, &(0x7f0000000140)=0x40000) [ 274.251826] cgroup: fork rejected by pids controller in /syz2 00:32:40 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={r2}) [ 274.696576] kauditd_printk_skb: 138 callbacks suppressed [ 274.696591] audit: type=1400 audit(1569889961.167:1327): avc: denied { map } for pid=9720 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl(r0, 0x800ffffffff, &(0x7f0000000080)="2e2b78af8771b89ff4381d349a88b0354f1a7275483eee9f583b1575fb0f1f95757e136c1aaecc2611d3083a12") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) openat$cgroup_ro(r1, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x2, 0x341800) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000180)=0xa) readv(r2, &(0x7f00000002c0), 0x1a5) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) [ 274.762019] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:41 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r3, 0x0) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000000)=[0x5, 0x40]) [ 274.883199] audit: type=1400 audit(1569889961.207:1328): avc: denied { map } for pid=9720 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 274.927542] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 275.009881] audit: type=1400 audit(1569889961.217:1329): avc: denied { map } for pid=9720 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000700)='id_resolver\x00', &(0x7f0000000740)={'syz', 0x0}, 0x0, 0xfffffffffffffffa) add_key(&(0x7f00000007c0)='ceph\x00', &(0x7f0000000800)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet(0x10, 0x2, 0x0) mkdir(0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}], 0x1) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)}], 0x2) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x10001) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000002c0)=@req={0x4, 0x8b5, 0x55, 0x7ff}, 0x10) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x7) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x100, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)=@un=@abs, 0x80, &(0x7f0000000100)=[{0x0}], 0x1}, 0x20) umount2(&(0x7f0000000000)='./file0/file0/../file0\x00', 0x0) prctl$PR_GET_DUMPABLE(0x3) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') [ 275.219040] audit: type=1400 audit(1569889961.217:1330): avc: denied { map } for pid=9720 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:41 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={r2}) 00:32:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r3, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x20003, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffc]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 275.395201] audit: type=1400 audit(1569889961.507:1331): avc: denied { map } for pid=9810 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 275.484999] audit: type=1400 audit(1569889961.517:1332): avc: denied { map } for pid=9810 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 275.705722] audit: type=1400 audit(1569889961.527:1333): avc: denied { map } for pid=9810 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x7) memfd_create(&(0x7f0000000040)='lotrusted\x1a\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000000c0)="791d22f067e22c175180654aae36e586a4ce1d8adebd94b3e206e9b24495a8fc6cbb2e4baf8d0ca0471529b9b57392eafba6dc2678e71dca3702fd55166496b84ddbab0d68f3aa254e0b977b705deebdeab9551a9293f0a12749779bfbc0bb12a410964ab1356be12510f2773c067d8a82e3aca43e2f70b2564cf0afca59b42ee74640554a01e912e8f3a757", 0x8c) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) [ 275.875894] audit: type=1400 audit(1569889961.607:1334): avc: denied { map } for pid=9810 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 276.017515] audit: type=1400 audit(1569889961.627:1335): avc: denied { map } for pid=9810 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 276.088468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 276.193087] audit: type=1400 audit(1569889961.647:1336): avc: denied { map } for pid=9810 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:42 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={r2}) 00:32:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = dup(0xffffffffffffffff) syz_open_pts(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000080)=[{0x4000006}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416f1a}) 00:32:43 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x200200, 0x0) r4 = eventfd2(0x10001, 0x80801) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r6 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x10001) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r7, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xa448}, {r3, 0xa40}, {r4, 0x10}, {r5, 0x4}, {r6, 0x80}, {r7, 0x20}], 0x6, &(0x7f0000000140), &(0x7f0000000180)={0xfffffffffffffffb}, 0x8) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000000)={0x4, "83cd559aff4bc65a995089c326edc927e6e79e4b6664104c5df4578c4176f35e", 0x0, 0x3}) r9 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e7", 0x10, 0xfffffffffffffffe) r10 = add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r10, r9}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00\x8d\xff\xff\xff\x00'}}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000001c0)={r9, 0xcb, 0x1000}, &(0x7f0000000200)={'enc=', 'oaep', ' hash=', {'rmd128\x00'}}, &(0x7f0000000280)="ef5941e9b1b5aac331997f33098fdc00d0add95f3c3ecb6650b9334edde068edd985b861b8f2d6c00a1900edf3e8c9a3db173c0ad856b4e30f766d26132485b168f085e9d599d0f628fa6d20da1c293a1a8b95035e164a0cebf590f48e27e110cb43313c216ecce52ffda9abb9f62cb0945582f41e76c0f3ba607105eb8a19c8f0ddecb4109b1abd065ccfddaafa4f7fa1245b0383d3af684dbad205fc1cda14b061af5f436523149bf2adb57a83915a205a6e05d3f1f10c05780afc154e842c2473142b48915593cb94a6", &(0x7f0000000380)=""/4096) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r8, &(0x7f00000000c0)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400) setsockopt$sock_void(r11, 0x1, 0x0, 0x0, 0x0) [ 277.026479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='session=0x000000008000000$,\x00']) 00:32:43 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)) 00:32:43 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) exit(0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000cc0)=""/4096) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x400000c, 0x110, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000c80)='cgroup.stat\x00', 0x275a, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00a114ea3d6a72ea00019ff6590df2c3b420c74b6642d8a8c3fd3483c44288999b4931807c1d853e23a741f3c77d37609f31e383b7d204f629b3a824fba90019c13ed8e960c11bf4d9dc9d9b9e16bf4637536b5c3d44928ffe4daf139a3c"]) dup3(r0, 0xffffffffffffffff, 0x3e3f8c8f66db7998) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@mcast1, 0x0, 0x3, 0x1, 0x2}, &(0x7f0000000180)=0x20) 00:32:44 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x10001) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r4, &(0x7f0000000040)={0xffffffffffffffff, r2, 0x400}) 00:32:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write$FUSE_NOTIFY_POLL(r1, 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000140)={0xfffffffffffffd4c}, 0x38c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x202, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x2, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)={[0x3, 0x200, 0x9, 0xba, 0x0, 0x4, 0xffffffff, 0x7, 0x2, 0x8001, 0x0, 0x7, 0x8000, 0x100000001, 0x32c, 0x80000001], 0x4, 0x210}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20c82, 0x0) accept4$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x80000) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000140)={0xfffffffffffffd4c}, 0x38c) dup3(r3, r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20c82, 0x0) dup3(r5, r6, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) r7 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r7, 0xc0184900, &(0x7f0000000000)={0xa927, 0x129, 0x0, 0xffffffffffffffff}) dup(r8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="5c000000544029c92d8efbb89b1c4ce9df50f78bb9f8fd846eb9ac38b5c663c8df2e01de89461267c4028f64ebab28b7e945f47d4330bd46957655ce270963e90a3f4ede1149984cc583458aa0748e89993ed3aecd0a6fbd8ecab80bad7244ee"], &(0x7f0000000180)=0x64) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)}, 0x4004c) 00:32:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x6800, 0x6f}, [@ldst={0x3fd, 0x2, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000040)) 00:32:44 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:45 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:45 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)) 00:32:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1ab802, 0x0) write$sndseq(r0, &(0x7f000086afd0)=[{0x10081, 0x8}], 0x30) getsockopt$sock_buf(r0, 0x1, 0x24, &(0x7f00000001c0)=""/187, &(0x7f0000000140)=0xbb) readv(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=""/8, 0x8}], 0x1) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x81, 0x4) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) setitimer(0x11535bbf8d87c7c0, &(0x7f00000000c0)={{0x77359400}}, &(0x7f0000000100)) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x02|', @ifru_flags}) 00:32:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x848026, &(0x7f0000000080)=ANY=[@ANYBLOB="6a71666d743d76667376312c00649c648c2d480547b6044d5916bb56171165fb38239f853fd2850f6e5595a3f4a7b807717a97fbd3d130f82868908427086c305abd839abc3a25ef7b4f57169a3a5f685e257c2e8b12ba5776ebf4b8bed2dfe353465d"]) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x2) dup3(r1, r0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x71) 00:32:46 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:46 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) r3 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x10001) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000040)={0xb, 0x2, {0x55, 0xffc0, 0xb5eb, {0x2, 0x5}, {0x6, 0x9}, @period={0x5f, 0x2d36, 0x86c4, 0x0, 0x800, {0x7, 0xa6c, 0xff80, 0x2}, 0x3, &(0x7f0000000000)=[0x7ff, 0x0, 0x4]}}, {0x53, 0x101, 0x5, {0x0, 0x3f}, {0x646}, @rumble={0x6, 0x3}}}) [ 279.740881] kauditd_printk_skb: 152 callbacks suppressed [ 279.740895] audit: type=1400 audit(1569889966.207:1489): avc: denied { map } for pid=10198 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 279.926997] audit: type=1400 audit(1569889966.207:1490): avc: denied { map } for pid=10198 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x2be}], 0xc0ed0000, 0x0) modify_ldt$write2(0x11, &(0x7f0000000040)={0x9, 0x20000000, 0x400, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1}, 0x10) r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10001) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13d, 0xe144ea55138ec10}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r1, 0x6}}, 0x10) getrandom(&(0x7f00000001c0)=""/208, 0xd0, 0x3) syz_mount_image$gfs2(&(0x7f00000002c0)='gfs2\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000340)="64074db0d05a75a7244c46338767da62bbc447da17b382a3e1ebc6678418c4ba88494161e0660837a68f7b2a3de41e62083c7f5624ea634f9ad53efa1aee52bb2b91221ff7660334478895b132b5be5b6d273e9a78e8fbda053f78ed0d52d2fda6b5b75238d4fd2193699187ffcdbb4fcae3fb8e781de53e9ea55ded7492da070572d3c4c8d44ba8f3e73c26a244e18bfb1d7bee4e5d536d5fb9bd871945ddef66c38bb53926958e772de4fdde0ee924ec48e6bc77853a560aed9eec1fd5f0da67e5", 0xc2, 0xc5}, {&(0x7f0000000440)="c449d7893eb62674884c266296c80bfd6c5ef0774990b086fcc22643a895fa3288a34e1abfada9edb38ce30ddba4a9252ebc393203d2796d419a34c4aa9a10e111f43a786f65b41eec0e45194fbf7b5d3bbfb6e0f3a0262e63490b0796a9126e96e4c123c91424a9", 0x68, 0x5}, {&(0x7f0000000500)="9fe390a961cf6a5f099feca2a5fac9cb9f45d31294d12254e8ad44930161", 0x1e, 0x650}, {&(0x7f0000000540)="adbad1b61809edb11c88c6cbba8cd8c8278aa382794d9fd826166a00048d72813ceee6ff6c00cc97c023d14cad43a677b7654d6e739e180a89276474273226d8ccc51fbef3776187206a374d6016e95e177dcf0c78698fee2419c29aa214b78beff052", 0x63, 0x8}], 0x8000, &(0x7f0000000640)={[{@quota='quota'}, {@quota_on='quota=on'}, {@locktable={'locktable', 0x3d, 'vfat\x00'}}, {@quota_account='quota=account'}, {@lockproto_dlm='lockproto=dlm'}, {@statfs_percent={'st\x04\x00\x00\x00\x02\x00\x00\x02\x00\x00\x00t', 0x3d, 0x4000000130}}], [{@smackfsroot={'smackfsroot', 0x3d, ')bdevcpuset^'}}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}, {@measure='measure'}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}) 00:32:46 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)) [ 280.145699] audit: type=1400 audit(1569889966.217:1491): avc: denied { map } for pid=10198 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x33780000, @remote, 0x20}}, 0x80, 0x4}, &(0x7f0000000380)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000003c0)={r1, 0xe90f}, 0x8) prctl$PR_GET_DUMPABLE(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000400)={0xa9, 0xffff, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r3, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r4, 0x2081ff) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan0&\x00', r4}, 0x10) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000180)='F', 0x1, 0xfffffffffffffffe) keyctl$setperm(0x5, r6, 0x80008) keyctl$describe(0xb, r6, 0x0, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000140)={0x2, 0xca, 0x2}) keyctl$read(0xb, r6, &(0x7f0000000080)=""/170, 0xaa) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 00:32:46 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 280.304925] audit: type=1400 audit(1569889966.297:1492): avc: denied { map } for pid=10198 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.450434] audit: type=1400 audit(1569889966.307:1493): avc: denied { map } for pid=10198 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.629555] audit: type=1400 audit(1569889966.687:1494): avc: denied { map } for pid=10207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 280.795251] audit: type=1400 audit(1569889966.697:1495): avc: denied { map } for pid=10207 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:47 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)) 00:32:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mknod$loop(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='ext4\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) [ 280.929883] audit: type=1400 audit(1569889966.727:1496): avc: denied { map } for pid=10207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:47 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 281.090389] audit: type=1400 audit(1569889966.737:1497): avc: denied { map } for pid=10207 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:47 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = getpid() tkill(r2, 0x9) r3 = getpgrp(r2) setpriority(0x3, r3, 0x1) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(r1, r1, 0x7, r4, &(0x7f00000000c0)) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6c, 0x125000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r5, 0x80045700, &(0x7f0000000040)) [ 281.314808] audit: type=1400 audit(1569889966.777:1498): avc: denied { map } for pid=10207 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:48 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x400452c8, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000012c0), 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x40000000000a132, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto$inet6(r0, &(0x7f0000000200)="bbbcdd22cf9559647344ae1a99f8b6d9742dbc094a06cba1b04f51cc2e0cd2207524e77ee96cf8b319670e375c7cc1ad2ad9805a933967abcd0f89f355dfe6e83f8a25a2ccff1d4d41b59a6bde4195385d2f8067c86705e9054da6ced09c57d8a57ca5ea3d0cf5cad0dab9332459faf8d776e57b111c7d1fefd098c68f4e6d2f05524d584f5fdd996490a6f3ae34d04c918be07c359707e88a9fa946d72545ca2a9f93826ac5429c2ce3e8b6e16e", 0xae, 0x1, &(0x7f0000000040)={0xa, 0x4e20, 0x80000000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x40}, 0x1c) sendto(r0, &(0x7f00000000c0)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x103, 0x0, 0x0) 00:32:48 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:48 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:48 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() r1 = socket$nl_xfrm(0x10, 0x3, 0x6) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, r0, 0x7, r1, &(0x7f00000000c0)) 00:32:48 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:48 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 3: getpeername$inet(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, 0x0) r0 = open(0x0, 0x2004, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) getegid() socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x9481729846548900, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) keyctl$set_reqkey_keyring(0xe, 0x5) 00:32:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000000c0)={0xf97cff8c, 0x8}, 0x10) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f0000000000)) 00:32:49 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() tkill(r1, 0x9) tkill(r1, 0x7) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r2, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 1: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:49 executing program 0: unshare(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x100060, 0xa808) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x3, 0x8001, 0x101, 0x2, 0x9}) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="870a04057f40010400000000000001fe800000003d939c39bc1348d10000aafe8000000000000000000000000000bbfe880000000000000000000000000101fe8000000000000000000000000000bb64628c8ce0dbdc050f229ff67ef111b6a2c080bbd3513c0378b4ee772f3d7bfe930e5d57cd6cd390c4037e4518d2755065eda6f5292cbd76db42ccb244a4872c494755c696f8061e45fbc62387a9d2613bf9779622cff32b54d1cb1acde4f937df25ec0b5bee34a200667a38281482d1fb252e9e39b01f101b7ed4f3d8e91261738ee23fc8b6a2957cfd916de970"], 0x58) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x400000000000064, 0x0) 00:32:50 executing program 1: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:50 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) gettid() socket$nl_xfrm(0x10, 0x3, 0x6) 00:32:50 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:51 executing program 1: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:51 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 284.886369] kauditd_printk_skb: 160 callbacks suppressed [ 284.886387] audit: type=1400 audit(1569889971.357:1659): avc: denied { map } for pid=10700 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') dup3(0xffffffffffffffff, r1, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x4000000, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r5 = dup(r4) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfcd2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x81}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x874e}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r5}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000c008) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="380000001000050700b4cbc9765f6f76861fc2528c6801315200"/36, @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100677265000c0002000800090000000000"], 0x38}}, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000340)=""/103, &(0x7f00000003c0)=0x67) r6 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000300)=0x4) [ 285.018195] audit: type=1400 audit(1569889971.357:1660): avc: denied { map } for pid=10700 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x10001) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x10001) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x5) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x20000) [ 285.191339] audit: type=1400 audit(1569889971.357:1661): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 285.396384] audit: type=1400 audit(1569889971.387:1662): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 285.558224] audit: type=1400 audit(1569889971.527:1663): avc: denied { map } for pid=10700 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:52 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 285.745777] audit: type=1400 audit(1569889971.527:1664): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 285.942094] audit: type=1400 audit(1569889971.567:1665): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:52 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 286.093673] audit: type=1400 audit(1569889971.567:1666): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:52 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) sendmsg$tipc(r0, 0x0, 0x40000) socket$kcm(0x10, 0x5, 0x10) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="180000003100050ad25a80648c6394fb0400fc0010000b40", 0x18}], 0x1}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000000c0)={0x1, {}, 0x0, 0x5}) openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x2000000) [ 286.240722] audit: type=1400 audit(1569889971.607:1667): avc: denied { map } for pid=10700 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:52 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 286.347848] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 286.403479] audit: type=1400 audit(1569889971.847:1668): avc: denied { map } for pid=10720 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:32:53 executing program 5: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x118, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x1) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2) [ 286.677974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10737 comm=syz-executor.3 00:32:53 executing program 5: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:53 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 286.855211] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:32:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(0xffffffffffffffff) syz_open_pts(r2, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x1, 0x7}) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000120007031dfffd946f610500070000006700000077000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:32:53 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x2f2, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x33, 0x119, 0xfffffffc, 0x25dfdbfe, {0x2}}, 0x14}}, 0x4000) 00:32:53 executing program 5: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) [ 287.174391] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 00:32:53 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:53 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 00:32:54 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:54 executing program 5: r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000440)="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", 0xc16, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:32:54 executing program 2: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = gettid() r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup(0xffffffffffffffff) syz_open_pts(r3, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r6}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) r7 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r9}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r7, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r9}}, 0xc) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x2, r9, 0x1c, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f00000000c0)) 00:32:54 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:54 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000f00"/24], &(0x7f0000000180)='GPL\x00'}, 0x48) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20440, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="afddd8b97ca4362227385ed284b30b50e5d506a1cda13529f7985699760b30328626cb52f0c832ee18eb29f1de639cce6e643148a3c5ad6ed9696a4fb4528785b3f8d1b986405454961af62f01401832ff214f1aff07e0cd27e8b90083099d85394acd41a1ca856cc43e467a6e3339cc06095ded8d0e8affe0b22c54593230b97b5898d89bbd3e0a8184cd3bb1fb17e75c299dd5b88f14b523eb40ed45c249e4580412a2def2e6f90b5c8be2e47cd4e4c9003291d9b2dee9cf356d422628e01a14a5a94f303b2ed8aa7778") 00:32:54 executing program 1: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)) 00:32:54 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r2 = socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(r0, 0x11, 0x0, 0x100000001) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) [ 288.685110] ------------[ cut here ]------------ [ 288.691640] ODEBUG: free active (active state 1) object type: rcu_head hint: (null) [ 288.703354] WARNING: CPU: 1 PID: 10794 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 288.712219] Kernel panic - not syncing: panic_on_warn set ... [ 288.712219] [ 288.719613] CPU: 1 PID: 10794 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 288.726551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.737046] Call Trace: [ 288.739664] dump_stack+0x172/0x1f0 [ 288.743321] panic+0x263/0x507 [ 288.744864] kobject: 'loop1' (0000000044ae1499): kobject_uevent_env [ 288.746528] ? __warn_printk+0xf3/0xf3 [ 288.746545] ? debug_print_object+0x168/0x250 [ 288.746563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.762617] kobject: 'loop1' (0000000044ae1499): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 288.767178] ? __warn.cold+0x5/0x4a [ 288.767189] ? __warn+0xe8/0x1d0 [ 288.767204] ? debug_print_object+0x168/0x250 [ 288.767213] __warn.cold+0x20/0x4a [ 288.767229] ? trace_hardirqs_off+0x62/0x220 [ 288.767239] ? debug_print_object+0x168/0x250 [ 288.767258] report_bug+0x263/0x2b0 [ 288.804577] do_error_trap+0x204/0x360 [ 288.808491] ? math_error+0x340/0x340 [ 288.812536] ? wake_up_klogd+0x99/0xd0 [ 288.818974] ? vprintk_emit+0x1ab/0x690 [ 288.823067] ? error_entry+0x7c/0xe0 [ 288.826905] ? trace_hardirqs_off_caller+0x65/0x220 [ 288.827796] kobject: 'loop5' (000000007e9872ae): kobject_uevent_env [ 288.832155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.832174] do_invalid_op+0x1b/0x20 [ 288.832193] invalid_op+0x14/0x20 [ 288.850815] RIP: 0010:debug_print_object+0x168/0x250 [ 288.855945] Code: dd 20 56 82 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 20 56 82 87 48 c7 c7 60 4b 82 87 e8 d6 04 19 fe <0f> 0b 83 05 cb 83 17 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 288.863661] kobject: 'loop5' (000000007e9872ae): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 288.878941] RSP: 0018:ffff88804ac7fb78 EFLAGS: 00010082 [ 288.878952] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 288.878958] RDX: 0000000000000000 RSI: ffffffff8155dbd6 RDI: ffffed100958ff61 [ 288.878965] RBP: ffff88804ac7fbb8 R08: ffff88804b4b2300 R09: ffffed1015d23ee3 [ 288.878970] R10: ffffed1015d23ee2 R11: ffff8880ae91f717 R12: 0000000000000001 [ 288.878977] R13: ffffffff8879f200 R14: 0000000000000000 R15: ffff8880889ff4e0 [ 288.879006] ? vprintk_func+0x86/0x189 [ 288.879025] ? debug_print_object+0x168/0x250 [ 288.879044] debug_check_no_obj_freed+0x29f/0x464 [ 288.949311] kmem_cache_free+0x18f/0x260 [ 288.954613] free_task+0xdd/0x120 [ 288.959717] __put_task_struct+0x20f/0x4c0 [ 288.963983] finish_task_switch+0x52b/0x780 [ 288.968333] ? switch_mm_irqs_off+0x2de/0x1360 [ 288.973106] __schedule+0x86e/0x1dc0 [ 288.978599] ? pci_mmcfg_check_reserved+0x170/0x170 [ 288.983662] ? do_group_exit+0x2e9/0x370 [ 288.987757] ? preempt_schedule+0x4b/0x60 [ 288.991930] preempt_schedule_common+0x4f/0xe0 [ 288.996534] preempt_schedule+0x4b/0x60 [ 289.000691] ___preempt_schedule+0x16/0x18 [ 289.004959] _raw_spin_unlock_irq+0x74/0x90 [ 289.009885] do_group_exit+0x2e9/0x370 [ 289.016016] __x64_sys_exit_group+0x44/0x50 [ 289.020369] do_syscall_64+0xfd/0x620 [ 289.024198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.029563] RIP: 0033:0x459a29 [ 289.032773] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.053935] RSP: 002b:00007ffdcb300f58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 289.062038] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000459a29 [ 289.069700] RDX: 0000000000413651 RSI: 0000000000a74ef0 RDI: 0000000000000000 [ 289.077576] RBP: 00000000004bf121 R08: 000000000000000c R09: 00007ffdcb301060 [ 289.085018] R10: 0000555555fb8940 R11: 0000000000000246 R12: 000000000075bfc8 [ 289.092757] R13: 0000000000000002 R14: 0000000000000001 R15: 000000000075bfd4 [ 289.100204] [ 289.100209] ====================================================== [ 289.100214] WARNING: possible circular locking dependency detected [ 289.100217] 4.19.75 #0 Not tainted [ 289.100221] ------------------------------------------------------ [ 289.100226] syz-executor.2/10794 is trying to acquire lock: [ 289.100229] 0000000065761502 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 289.100242] [ 289.100246] but task is already holding lock: [ 289.100248] 00000000f2e6bca7 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 289.100260] [ 289.100264] which lock already depends on the new lock. [ 289.100266] [ 289.100268] [ 289.100272] the existing dependency chain (in reverse order) is: [ 289.100274] [ 289.100276] -> #3 (&obj_hash[i].lock){-.-.}: [ 289.100289] _raw_spin_lock_irqsave+0x95/0xcd [ 289.100292] __debug_object_init+0xc6/0xc30 [ 289.100296] debug_object_init+0x16/0x20 [ 289.100299] hrtimer_init+0x2a/0x300 [ 289.100302] init_dl_task_timer+0x1b/0x50 [ 289.100305] __sched_fork+0x22a/0x4b0 [ 289.100308] init_idle+0x75/0x800 [ 289.100311] sched_init+0x952/0x9f0 [ 289.100314] start_kernel+0x402/0x8c5 [ 289.100318] x86_64_start_reservations+0x29/0x2b [ 289.100321] x86_64_start_kernel+0x77/0x7b [ 289.100325] secondary_startup_64+0xa4/0xb0 [ 289.100327] [ 289.100328] -> #2 (&rq->lock){-.-.}: [ 289.100340] _raw_spin_lock+0x2f/0x40 [ 289.100343] task_fork_fair+0x6a/0x520 [ 289.100346] sched_fork+0x3af/0x900 [ 289.100350] copy_process.part.0+0x1859/0x7a30 [ 289.100353] _do_fork+0x257/0xfd0 [ 289.100356] kernel_thread+0x34/0x40 [ 289.100360] rest_init+0x24/0x222 [ 289.100363] start_kernel+0x88c/0x8c5 [ 289.100367] x86_64_start_reservations+0x29/0x2b [ 289.100372] x86_64_start_kernel+0x77/0x7b [ 289.100376] secondary_startup_64+0xa4/0xb0 [ 289.100378] [ 289.100379] -> #1 (&p->pi_lock){-.-.}: [ 289.100392] _raw_spin_lock_irqsave+0x95/0xcd [ 289.100396] try_to_wake_up+0x94/0xf50 [ 289.100399] wake_up_process+0x10/0x20 [ 289.100402] __up.isra.0+0x136/0x1a0 [ 289.100405] up+0x9c/0xe0 [ 289.100408] __up_console_sem+0xb7/0x1c0 [ 289.100412] console_unlock+0x6c7/0x10b0 [ 289.100415] vprintk_emit+0x238/0x690 [ 289.100418] vprintk_default+0x28/0x30 [ 289.100421] vprintk_func+0x7e/0x189 [ 289.100425] printk+0xba/0xed [ 289.100428] kauditd_hold_skb.cold+0x3f/0x4e [ 289.100432] kauditd_send_queue+0x12b/0x170 [ 289.100435] kauditd_thread+0x732/0xa60 [ 289.100438] kthread+0x354/0x420 [ 289.100441] ret_from_fork+0x24/0x30 [ 289.100443] [ 289.100445] -> #0 ((console_sem).lock){-.-.}: [ 289.100457] lock_acquire+0x16f/0x3f0 [ 289.100461] _raw_spin_lock_irqsave+0x95/0xcd [ 289.100465] down_trylock+0x13/0x70 [ 289.100468] __down_trylock_console_sem+0xa8/0x210 [ 289.100472] console_trylock+0x15/0xa0 [ 289.100476] vprintk_emit+0x21d/0x690 [ 289.100479] vprintk_default+0x28/0x30 [ 289.100482] vprintk_func+0x7e/0x189 [ 289.100484] printk+0xba/0xed [ 289.100488] __warn_printk+0x9b/0xf3 [ 289.100492] debug_print_object+0x168/0x250 [ 289.100495] debug_check_no_obj_freed+0x29f/0x464 [ 289.100499] kmem_cache_free+0x18f/0x260 [ 289.100502] free_task+0xdd/0x120 [ 289.100505] __put_task_struct+0x20f/0x4c0 [ 289.100508] finish_task_switch+0x52b/0x780 [ 289.100512] __schedule+0x86e/0x1dc0 [ 289.100519] preempt_schedule_common+0x4f/0xe0 [ 289.100522] preempt_schedule+0x4b/0x60 [ 289.100526] ___preempt_schedule+0x16/0x18 [ 289.100531] _raw_spin_unlock_irq+0x74/0x90 [ 289.100534] do_group_exit+0x2e9/0x370 [ 289.100538] __x64_sys_exit_group+0x44/0x50 [ 289.100542] do_syscall_64+0xfd/0x620 [ 289.100546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.100548] [ 289.100552] other info that might help us debug this: [ 289.100553] [ 289.100556] Chain exists of: [ 289.100558] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 289.100574] [ 289.100578] Possible unsafe locking scenario: [ 289.100580] [ 289.100584] CPU0 CPU1 [ 289.100587] ---- ---- [ 289.100589] lock(&obj_hash[i].lock); [ 289.100597] lock(&rq->lock); [ 289.100605] lock(&obj_hash[i].lock); [ 289.100612] lock((console_sem).lock); [ 289.100619] [ 289.100622] *** DEADLOCK *** [ 289.100623] [ 289.100627] 1 lock held by syz-executor.2/10794: [ 289.100629] #0: 00000000f2e6bca7 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 289.100643] [ 289.100645] stack backtrace: [ 289.100650] CPU: 1 PID: 10794 Comm: syz-executor.2 Not tainted 4.19.75 #0 [ 289.100657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.100660] Call Trace: [ 289.100664] dump_stack+0x172/0x1f0 [ 289.100668] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 289.100671] __lock_acquire+0x2e19/0x49c0 [ 289.100674] ? mark_held_locks+0x100/0x100 [ 289.100677] ? kvm_clock_read+0x18/0x30 [ 289.100681] ? kvm_sched_clock_read+0x9/0x20 [ 289.100684] lock_acquire+0x16f/0x3f0 [ 289.100686] ? down_trylock+0x13/0x70 [ 289.100690] _raw_spin_lock_irqsave+0x95/0xcd [ 289.100693] ? down_trylock+0x13/0x70 [ 289.100697] ? vprintk_emit+0x21d/0x690 [ 289.100700] down_trylock+0x13/0x70 [ 289.100703] ? vprintk_emit+0x21d/0x690 [ 289.100707] __down_trylock_console_sem+0xa8/0x210 [ 289.100710] console_trylock+0x15/0xa0 [ 289.100714] vprintk_emit+0x21d/0x690 [ 289.100717] vprintk_default+0x28/0x30 [ 289.100721] vprintk_func+0x7e/0x189 [ 289.100724] printk+0xba/0xed [ 289.100727] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 289.100730] ? __warn_printk+0x8f/0xf3 [ 289.100733] __warn_printk+0x9b/0xf3 [ 289.100736] ? add_taint.cold+0x16/0x16 [ 289.100739] debug_print_object+0x168/0x250 [ 289.100742] debug_check_no_obj_freed+0x29f/0x464 [ 289.100745] kmem_cache_free+0x18f/0x260 [ 289.100749] free_task+0xdd/0x120 [ 289.100752] __put_task_struct+0x20f/0x4c0 [ 289.100755] finish_task_switch+0x52b/0x780 [ 289.100758] ? switch_mm_irqs_off+0x2de/0x1360 [ 289.100761] __schedule+0x86e/0x1dc0 [ 289.100765] ? pci_mmcfg_check_reserved+0x170/0x170 [ 289.100768] ? do_group_exit+0x2e9/0x370 [ 289.100771] ? preempt_schedule+0x4b/0x60 [ 289.100774] preempt_schedule_common+0x4f/0xe0 [ 289.100778] preempt_schedule+0x4b/0x60 [ 289.100781] ___preempt_schedule+0x16/0x18 [ 289.100784] _raw_spin_unlock_irq+0x74/0x90 [ 289.100788] do_group_exit+0x2e9/0x370 [ 289.100792] __x64_sys_exit_group+0x44/0x50 [ 289.100795] do_syscall_64+0xfd/0x620 [ 289.100798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.100801] RIP: 0033:0x459a29 [ 289.100811] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.100815] RSP: 002b:00007ffdcb300f58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 289.100823] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000459a29 [ 289.100828] RDX: 0000000000413651 RSI: 0000000000a74ef0 RDI: 0000000000000000 [ 289.100833] RBP: 00000000004bf121 R08: 000000000000000c R09: 00007ffdcb301060 [ 289.100838] R10: 0000555555fb8940 R11: 0000000000000246 R12: 000000000075bfc8 [ 289.100843] R13: 0000000000000002 R14: 0000000000000001 R15: 000000000075bfd4 [ 289.102202] Kernel Offset: disabled [ 289.903795] Rebooting in 86400 seconds..